One of the most talked about threats this month is the infamous Ukash ransomware.
Researchers have discovered a dropper trojan that uses a new trick to stay active but hidden as it takes advantage of vulnerabilities in Windows code.
A new variant of the Ramnit virus harvested the login credentials of more than 45,000 Facebook users worldwide, according to researchers.
Attackers have been circulating a trojan via email messages with subjects such as "ACH payroll payment was not accepted by Central Trust and Savings Bank."
With record numbers of threats and the increasing inability to detect them through traditional means, the time is now for the anti-virus industry to reinvent itself.
A U.S. military spokeswoman said a "credential stealer," not a keylogger, was responsible, and that no missions were impacted.
A trojan downloader is not a birthday gift you want to open.
Microsoft may face challenges from anti-virus rivals after announcing this week that the next version of Windows will come with built-in AV protection.
The cost of digital crimes now rivals the illegal drug trade, according to a new report from Symantec.
If it isn't maliciously intended, can it be malware?
The way we were is too much like the way we are: There is no way I will ever say there is no way.
An undetectable version of a two-year-old worm has infiltrated the network of a state agency in Massachusetts to steal sensitive information.
On the heels of the Stuxnet worm, Iran officials say they have discovered a new piece of malware also designed to sabotage government systems.
Most users are not aware of the risks in smartphones and the security industry is struggling to develop tools to defend these devices, a panel of experts said on Wednesday at RSA Conference in San Francisco.
A virus recently compromised a clinic computer at the University of Oklahoma-Tulsa neurology practice to possibly retrieve sensitive documents on the machine.
A number of major U.S. major organizations were affected by a rapidly spreading email worm that hit inboxes worldwide beginning Thursday.
Nearly half of all small and midsize businesses (SMBs) have fallen victim to cybercrime, yet some still are operating with no security defenses in place, according to a report released this week by anti-virus firm Panda Security.
Virtualization is quickly transforming the IT landscape, but some organizations may have overlooked the security ramifications it presents.
A top Symantec engineer recounts one of the most exciting days of his career: Ten years ago this week, the ILOVEYOU, or LoveBug, worm spread across the world and crippled PCs.
A flawed McAfee update caused computers around the world to become stuck in an endless cycle of reboots.
The personal information of former, prospective, and current undergraduate students at the university may have been stolen when a hacker gained access to the university's Office of Admissions server.
The amount of the amount of spam containing malware increased ninefold during September over the previous month, according to Symantec.
The new anti-virus feature in Snow Leopard could entice cybercriminals to create more Mac malware, say security firms.
The most dangerous websites on the web propagate an average of 18,000 different pieces of malware.
Nineteen percent of malware variants last for two days, and just nine percent last three days, according to anti-virus vendor Panda Security.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure