For roughly five months beginning in January, traffic confirmation attacks were used to attempt to "deanonymize" Tor users.
Vulnerabilities existing in Symantec Endpoint Protection can be exploited to escalate privileges, perhaps resulting in a complete Windows domain takeover.
Out of the 237 disclosed data breaches last quarter, encryption was used in only 10 instances.
Symantec researchers found a new variant of the banking trojan.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.
Symantec researchers revealed that the backdoor is dropped after attackers exploit a Windows ActiveX vulnerability.
A Lieberman Software survey highlights the issue or poor password management, even among security pros.
Kaspersky Lab has observed Andromeda bot being used to deliver CTB-Locker, a new ransomware that hides its command-and-control server on the Tor network.
A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.
The Wall Street Journal confirmed on Tuesday that an outside party exploited a vulnerability and hacked into its new graphics systems.
Prolexic's second quarter DDoS report noted the proliferation of shorter attacks that ate up more bandwidth.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.
Daniel Howe spoke about obfuscation and presented a couple of tools that he helped create at hacker conference HOPE X.
A Secunia quarterly report found Microsoft XML Core Services 4 to be the "most exposed" of widely used programs.
On Wednesday, Symantec released details on the malware's developed features.
Sentinel Labs dubbed the repurposed malware "Gyges."
As of Wednesday afternoon, 127 SSL certificates associated with malware and botnet activities have been blacklisted.
Popular Japanese adult websites have been compromised to distribute the Aibatook banking trojan, a threat that could make its way to the U.S.
In less than a day, over 6,000 infected machines were updated with the new Pushdo variant.
Google has hired a team of researchers who will be dedicated to digging up vulnerabilities, malware and other threats to internet users.
Microsoft blames a "well known" design limitation in Active Directory's authentication protocol, but researchers who discovered the exploit beg to differ.
An Emulex survey revealed that 77 percent of IT staffers have incorrectly reported the root cause of a security incident to their executive team.
Trusteer warns that the financial malware was first advertised last week on a major underground forum.
Zberp malware was developed from the source code of Zeus and financial malware Carberp.
The Gameover variant of the nefarious Zeus trojan was disrupted in early June, but researchers with Malcovery are observing a return.
BitDefender, the firm that discovered the ransomware, detailed Cryptolocker's chances of making a comeback.
Using phishing emails, attackers are targeting various industries with unique keylogger malware as part of an ongoing campaign, NightHunter, that dates back to 2009.