A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.
Symantec researchers found a new variant of the banking trojan.
In a study, HP Fortify tested 10 popular Internet of Things (IoT) devices, including TVs, webcams and device control hubs.
Researchers with Bluebox, who uncovered the vulnerability, dubbed it "Fake ID" because it enables the identity of trusted applications to be copied.
Mozilla plans to introduce a feature in Firefox 32 that, based on preliminary testing, could cut the amount of undetected malware downloads in half.
FireEye researchers took a closer look at the malware and provided details in a blog post last week.
Symantec researchers revealed that the backdoor is dropped after attackers exploit a Windows ActiveX vulnerability.
A Lieberman Software survey highlights the issue or poor password management, even among security pros.
Kaspersky Lab has observed Andromeda bot being used to deliver CTB-Locker, a new ransomware that hides its command-and-control server on the Tor network.
The two-week exercise, "Cyber Guard 14-1," was completed this month.
A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.
A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.
Android/Simplocker ransomware now encrypts archive files, asks to be installed as a Device Administrator, and delivers an English-language ransom message.
Prolexic's second quarter DDoS report noted the proliferation of shorter attacks that ate up more bandwidth.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
CyberArk interviewed 373 IT security executives and other senior management in North America, Europe and the Asia-Pacific as part of its eighth annual Global Advanced Threat Landscape survey.
Shortened URLs on Facebook, leading to a risqué webcam video, are actually being used to spread malware.
Almost one in four employees at Canada's Justice Department fell prey to internet phishing in an exercise last December.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
Solutionary's SERT research team analyzed threats for the second quarter for its Quarterly Threat Intelligence Report.
An Israeli broadcasting regulator confirmed that the incident occurred.
A Secunia quarterly report found Microsoft XML Core Services 4 to be the "most exposed" of widely used programs.
On Wednesday, Symantec released details on the malware's developed features.
An RCE vulnerability existing in several Cisco Wireless Residential Gateway products can be exploited to serve up fraudulent advertisements and deliver malware.
Sentinel Labs dubbed the repurposed malware "Gyges."
In a Tuesday hearing, a Senate subcommittee heard testimony from government and private sector security experts over the botnet explosion.
As of Wednesday afternoon, 127 SSL certificates associated with malware and botnet activities have been blacklisted.
Popular Japanese adult websites have been compromised to distribute the Aibatook banking trojan, a threat that could make its way to the U.S.
In less than a day, over 6,000 infected machines were updated with the new Pushdo variant.