One of the most talked about threats this month is the infamous Ukash ransomware.
Researchers have discovered a dropper trojan that uses a new trick to stay active but hidden as it takes advantage of vulnerabilities in Windows code.
A new variant of the Ramnit virus harvested the login credentials of more than 45,000 Facebook users worldwide, according to researchers.
Attackers have been circulating a trojan via email messages with subjects such as "ACH payroll payment was not accepted by Central Trust and Savings Bank."
With record numbers of threats and the increasing inability to detect them through traditional means, the time is now for the anti-virus industry to reinvent itself.
A U.S. military spokeswoman said a "credential stealer," not a keylogger, was responsible, and that no missions were impacted.
A trojan downloader is not a birthday gift you want to open.
Microsoft may face challenges from anti-virus rivals after announcing this week that the next version of Windows will come with built-in AV protection.
The cost of digital crimes now rivals the illegal drug trade, according to a new report from Symantec.
If it isn't maliciously intended, can it be malware?
The way we were is too much like the way we are: There is no way I will ever say there is no way.
An undetectable version of a two-year-old worm has infiltrated the network of a state agency in Massachusetts to steal sensitive information.
On the heels of the Stuxnet worm, Iran officials say they have discovered a new piece of malware also designed to sabotage government systems.
Most users are not aware of the risks in smartphones and the security industry is struggling to develop tools to defend these devices, a panel of experts said on Wednesday at RSA Conference in San Francisco.
A virus recently compromised a clinic computer at the University of Oklahoma-Tulsa neurology practice to possibly retrieve sensitive documents on the machine.
A number of major U.S. major organizations were affected by a rapidly spreading email worm that hit inboxes worldwide beginning Thursday.
Nearly half of all small and midsize businesses (SMBs) have fallen victim to cybercrime, yet some still are operating with no security defenses in place, according to a report released this week by anti-virus firm Panda Security.
Virtualization is quickly transforming the IT landscape, but some organizations may have overlooked the security ramifications it presents.
A top Symantec engineer recounts one of the most exciting days of his career: Ten years ago this week, the ILOVEYOU, or LoveBug, worm spread across the world and crippled PCs.
A flawed McAfee update caused computers around the world to become stuck in an endless cycle of reboots.
The personal information of former, prospective, and current undergraduate students at the university may have been stolen when a hacker gained access to the university's Office of Admissions server.
The amount of the amount of spam containing malware increased ninefold during September over the previous month, according to Symantec.
The new anti-virus feature in Snow Leopard could entice cybercriminals to create more Mac malware, say security firms.
The most dangerous websites on the web propagate an average of 18,000 different pieces of malware.
Nineteen percent of malware variants last for two days, and just nine percent last three days, according to anti-virus vendor Panda Security.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards