The malware, dubbed "ISN," is masked as a module for Microsoft Internet Information Services (IIS) web-hosting software, Trustwave found.
Developers have proposed an authentication method that would allow Chrome apps to unlock users' screens in sleep mode.
The botnet is reportedly behind the compromise of more than 20,000 payment cards in recent months.
Microsoft announced on Wednesday that it would be improving and expanding its security to protect customer data amid growing concerns of government surveillance.
A lack of budget and resources is opening up enterprises to advanced persistent threats, according to a recent study by the Ponemon Institute.
Researchers discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo and Twitter.
After recently impacting banks in South Africa, the malware is now infecting point-of-sale systems throughout the globe, including those in the U.S., a security firm found.
Constantly updating technology coupled with the dynamic and evolving nature of data breaches may be stalling notification laws from becoming uniform across the United States.
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
According to Qualys, 39 percent of tested machines contained critical browser vulnerabilities, which users should be particularly mindful of during the holiday online shopping frenzy.
Attacks leveraging the Windows XP kernel vulnerability have been targeted, but limited so far, Microsoft says.
What self-described "stunt hackers" Charlie Miller and Chris Valasek did to a Ford Focus on national TV was akin to breaking into a home, raiding the fridge and taking a nap on the couch.
Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.
The issue would allow users to discover Facebook IDs - depending on the targets Facebook privacy settings - and leverage that credential into connecting with the person.
Over the last two months, attackers have opted to spread the malware via the Neutrino exploit kit, researchers found.
Twitter announced on Friday that it has introduced forward secrecy, a type of encryption property that makes decrypting communications close to impossible.
In addition to internet service providers (ISPs) making use of real-time response capabilities, a cyber security report suggested several other steps to stave off threats to the nation.
Attackers have concocted a type of social engineering scam that delivers malware by duping people into thinking that their anti-virus programs need to be updated.
According to the researcher who discovered the bug, Google swiftly addressed the security issue, which could leave users' passwords vulnerable to theft.
After announcing last month that it would give rewards for vulnerabilities discovered in open source software, Google is expanding its bug bounty program to include Android, the open source mobile operating system.
Finding ways to bypass or validate digital signatures on PCs and Android-based mobile devices in an attempt to distribute malware is fast becoming a new trend among attackers.
Breaches were by far the most costly incident for global respondents, accounting for more than $860,000 in losses annually at organizations.
In a new study, 33 percent of small to midsized organizations said they weren't sure how to best describe an advanced persistent threat (APT).
The backdoor trojan, dubbed "Fokirtor," was discovered in June by Symantec researchers.
A penetration testing firm analyzed publicly reported compromises over the last 10 years.
An iOS and Android application that claims to provide free 'likes' and followers to users of Instagram is actually a clever scam.
Barracuda Labs detected that Cracked.com was compromised as of Sunday.
Facebook users are being locked out of their accounts and asked to change their passwords if they shared credentials with a compromised Adobe account.
Researchers with the University of Cambridge revealed just how effective PIN Skimmers can be against mobile devices in a recently released study on the new type of side-channel attack.
Peter Szor - a well-known security researcher, entrepreneur and author - has passed away, according to posts on Twitter.