Google quickly removed the malware, which was reportedly disguised as a legitimate parental control app, from its marketplace.
Researchers with BAE Systems Applied Intelligence have determined that a possibly Russian-fueled malware campaign known as Snake, or Uroburos, may actually date back as far as 2006.
A new HTTPS remote administration tool for Android-based mobile devices has been discovered for sale on underground marketplaces, according to Symantec security researchers.
Researchers have discovered a Gameover variant of the Zeus trojan that has been modified to include the Necurs rootkit, which makes the malware tougher to detect and remove by protecting files on the disk and memory.
Researchers from North Carolina State University have created a tool that uses anomaly detection to distinguish authentic Android applications from those containing root exploit malware.
Attackers have remotely altered DNS configurations for more than 300,000 small office/home office routers, subsequently opening up victims to a host of compromises.
Experts discuss the most dangerous new attack techniques, which include point-of-sale malware, mobile and wireless threats, and compromise of industrial control systems.
iBanking mobile malware was first introduced to the underground market late last year, according to RSA.
The malware is based on the leaked code of Zeus and RAM-scraping malware.
Researchers hope the recently published exploit will spur service providers to provide an update for users.
All future hackers, aged five to 17, can register for The HacKid Conference - a family friendly event being held at the San Jose Tech Museum of Innovation.
Researchers at IOActive discovered the vulnerabilities in Belkin's WeMo home automation devices.
CERT Polska researchers have observed attackers using DNS redirection attacks - made possible due to vulnerabilities in home routers - to effectively access online banking accounts in Poland.
Kaspersky Lab's released a detailed report on Absolute Computrace, anti-theft software built into the firmware of laptops and desktops.
The most active banking trojan of 2013 was the Gameover variant Zeus, according to the latest research by the experts with the Dell SecureWorks Counter Threat Unit.
On Wednesday, Trustwave published a global survey on pressures faced by security decision makers.
At Black Hat Asia security conference in March, security researchers Javier Vazquez-Vidal and Alberto Garcia Illera will be presenting a device that allows an attacker to take over an automobile.
Dangerous file sharing practices put sensitive corporate data at risk - that is the focus of the latest report from Globalscape, a software company that surveyed more than 500 corporate employees.
SecureMac, a website focused on Mac security concerns, discovered the malware dubbed "CoinThief."
The hack is achieved by exploiting the service's method of creating security tokens, a researcher found.
Google has expanded its vulnerability reward program to include Chrome apps and extensions that were developed directly by the internet and technology company, as well as upped bounties offered for its Patch Reward Program.
The Bank of England has released the results of Waking Shark II, a Nov. 12, 2013, four-hour simulated cyber attack in London involving hundreds of financial institutions that was designed to test the city's cyber security readiness.
Approximately 31 percent of enterprises are already implanting or expanding upon app stores, and one-third plan to instate an enterprise store in 2014, according to a report.
A security firm highlighted the ways that U.S. defense contractors have reassessed their security programs to stave off insider threats.
Apple executives had a discussion with FDA Commissioner Margaret Hamburg in mid-December.
HP's Cyber Risk Report 2013 delved into encryption issues affecting data on mobile devices.
The "touchlogging" attack method will be presented in detail at RSA Conference next month.
A security update for the buggy MediaWiki platform was made available on Tuesday.
In the course of five months last year, a concerning number of users in the US were hit by ransomware, dubbed "Icepol."
This year's RSA Conference will coincide with another security event - TrustyCon - that reached capacity about six days after it was announced.