A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.
The Wall Street Journal confirmed on Tuesday that an outside party exploited a vulnerability and hacked into its new graphics systems.
Prolexic's second quarter DDoS report noted the proliferation of shorter attacks that ate up more bandwidth.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.
Daniel Howe spoke about obfuscation and presented a couple of tools that he helped create at hacker conference HOPE X.
A Secunia quarterly report found Microsoft XML Core Services 4 to be the "most exposed" of widely used programs.
On Wednesday, Symantec released details on the malware's developed features.
Sentinel Labs dubbed the repurposed malware "Gyges."
As of Wednesday afternoon, 127 SSL certificates associated with malware and botnet activities have been blacklisted.
Popular Japanese adult websites have been compromised to distribute the Aibatook banking trojan, a threat that could make its way to the U.S.
In less than a day, over 6,000 infected machines were updated with the new Pushdo variant.
Google has hired a team of researchers who will be dedicated to digging up vulnerabilities, malware and other threats to internet users.
Microsoft blames a "well known" design limitation in Active Directory's authentication protocol, but researchers who discovered the exploit beg to differ.
An Emulex survey revealed that 77 percent of IT staffers have incorrectly reported the root cause of a security incident to their executive team.
Trusteer warns that the financial malware was first advertised last week on a major underground forum.
Zberp malware was developed from the source code of Zeus and financial malware Carberp.
The Gameover variant of the nefarious Zeus trojan was disrupted in early June, but researchers with Malcovery are observing a return.
BitDefender, the firm that discovered the ransomware, detailed Cryptolocker's chances of making a comeback.
Using phishing emails, attackers are targeting various industries with unique keylogger malware as part of an ongoing campaign, NightHunter, that dates back to 2009.
Nearly 70 percent of critical infrastructure organizations said they experienced a security compromise in the last year.
Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions.
A cross-site scripting flaw impacting a Kaspersky website was quickly addressed by the security software company.
Emails and user credentials can be stolen in a man-in-the-middle attack because the Gmail iOS app does not perform certificate pinning.
Lecpetex attackers may have infected up to 250,000 computers, Facebook revealed.
Thousands of infected computers around the world are being used to brute-force point-of-sale systems utilizing remote desktop protocols.
Ninety-six percent of security pros employed AV and anti-malware solutions to protect data from APT attacks, while protections for mobile entry points fell at the bottom of the list.
After purchasing 20 "wiped" Android smartphones on eBay, AVAST researchers were able to restore photos and other personal information.
CrowdStrike revealed that the attack group is now targeting sensitive data about political affairs in Iraq.