One of the most talked about threats this month is the infamous Ukash ransomware.
Researchers have discovered a dropper trojan that uses a new trick to stay active but hidden as it takes advantage of vulnerabilities in Windows code.
A new variant of the Ramnit virus harvested the login credentials of more than 45,000 Facebook users worldwide, according to researchers.
Attackers have been circulating a trojan via email messages with subjects such as "ACH payroll payment was not accepted by Central Trust and Savings Bank."
With record numbers of threats and the increasing inability to detect them through traditional means, the time is now for the anti-virus industry to reinvent itself.
A U.S. military spokeswoman said a "credential stealer," not a keylogger, was responsible, and that no missions were impacted.
A trojan downloader is not a birthday gift you want to open.
Microsoft may face challenges from anti-virus rivals after announcing this week that the next version of Windows will come with built-in AV protection.
The cost of digital crimes now rivals the illegal drug trade, according to a new report from Symantec.
If it isn't maliciously intended, can it be malware?
The way we were is too much like the way we are: There is no way I will ever say there is no way.
An undetectable version of a two-year-old worm has infiltrated the network of a state agency in Massachusetts to steal sensitive information.
On the heels of the Stuxnet worm, Iran officials say they have discovered a new piece of malware also designed to sabotage government systems.
Most users are not aware of the risks in smartphones and the security industry is struggling to develop tools to defend these devices, a panel of experts said on Wednesday at RSA Conference in San Francisco.
A virus recently compromised a clinic computer at the University of Oklahoma-Tulsa neurology practice to possibly retrieve sensitive documents on the machine.
A number of major U.S. major organizations were affected by a rapidly spreading email worm that hit inboxes worldwide beginning Thursday.
Nearly half of all small and midsize businesses (SMBs) have fallen victim to cybercrime, yet some still are operating with no security defenses in place, according to a report released this week by anti-virus firm Panda Security.
Virtualization is quickly transforming the IT landscape, but some organizations may have overlooked the security ramifications it presents.
A top Symantec engineer recounts one of the most exciting days of his career: Ten years ago this week, the ILOVEYOU, or LoveBug, worm spread across the world and crippled PCs.
A flawed McAfee update caused computers around the world to become stuck in an endless cycle of reboots.
The personal information of former, prospective, and current undergraduate students at the university may have been stolen when a hacker gained access to the university's Office of Admissions server.
The amount of the amount of spam containing malware increased ninefold during September over the previous month, according to Symantec.
The new anti-virus feature in Snow Leopard could entice cybercriminals to create more Mac malware, say security firms.
The most dangerous websites on the web propagate an average of 18,000 different pieces of malware.
Nineteen percent of malware variants last for two days, and just nine percent last three days, according to anti-virus vendor Panda Security.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- Infostealer Laziok targets energy companies
- 30 percent of practitioners say they would pay cyber extortionists to retrieve their data
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says