Last month's featured news from Shamoon attacking oil companies to Wyndham Hotels challenging the FTC.
The same criminal gang that infiltrated Google in 2010 is continuing to target intellectual property housed by U.S. companies, but its using new web-based tactics to maximize its effectiveness.
Since July, researchers have been tracking a new variant of Pushdo, which is mixing command-and-control traffic with bogus HTTP requests to legitimate sites with the goal of evading detection.
September 04, 2012
Trojans can propagate further - without detection by anti-virus applications - when they are digitally signed.
A new data-stealing trojan has turned up on the systems of one of Radware's customers, according to researchers at the network security firm.
The operators of tens of thousands of machines in the United States that still are infected by the DNSChanger trojan have two days to purge the threat, or they will not be able to access the web.
The "Find and Call" app, which uploads a user's contact list to a remote server so its developers can spam friends and colleagues of the victim, is the first malware to enter the Apple App Store.
The infamous trojan Citadel, known for being the first crimeware kit to include a CRM module to communicate with its creators, will only be sold only to recommended sources.
Paging Dunder Mifflin. Security firm Symantec warned Thursday of a new trojan whose goal is to drop a file that automatically displays advertisements, a strain of adware known as Eorezo.
Mobile virus authors have adopted another tactic from their PC-sabotaging counterparts: infecting websites to spread their wares.
At least two security firms that estimated a significant drop in Mac systems infected with the data-stealing Flashback trojan admit they made erroneous calls.
Researchers have discovered a correlation between infected WordPress sites and the propagation of the prolific Mac Flashback trojan.
Security researchers said the number of Flashback-infected Mac computers significantly fell over the weekend, but that doesn't mean the botnet has been crippled.
Security experts are backing up one anti-virus vendor's estimate of the massive size of a Mac trojan botnet.
Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.
Banking trojan Zeus and its related families, which have looted a number of small and midsize businesses to the tune of millions, may be partially crippled after the latest Microsoft botnet enforcement effort.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
A federal judge has approved a request to extend the use of DNS servers, giving enterprises more time to remove the insidious DNSChanger trojan.
Researchers have discovered a dropper trojan that uses a new trick to stay active but hidden as it takes advantage of vulnerabilities in Windows code.
The exploit, which is being used in targeted attacks, arrives as an email that contains a Microsoft Word file and a separate DLL file, a rare combination considering DLL files are not typically sent over email.
A new variant of the Ramnit virus harvested the login credentials of more than 45,000 Facebook users worldwide, according to researchers.
Rogue developers uploaded malicious versions of at least a dozen popular games to the Android Market.
Most spam messages sent in recent days have been delivered with subject lines containing fake order or ticket numbers, delivery invoices, payment notices or tax information, according to researchers from security firm Websense.
The Hungary-based research lab responsible for detecting the Duqu trojan has released a toolkit to find traces of the trojan on a computer or in a whole network.
Microsoft issued a temporary fix for a vulnerability in the Windows kernel used to spread Duqu, the so-called "son of Stuxnet" trojan.
Three out of every four new malware strains created during the third quarter was a trojan, says a new report from PandaLabs.
Hackers over the summer targeted at least 29 companies in the chemical sector during an attack campaign aimed at stealing intellectual property.
The complex trojan aims to steal digital currency and use infected computers for Bitcoin mining.
A new piece of mobile malware targets Russian users of Symbian and Windows Mobile phones, and an Android strain may be in development.
The so-called "Tsunami" backdoor trojan is derived from an older Linux family of backdoors around since at least 2002.