Legislation aimed at countering cybercrime, including ransomware, is advancing toward the governor's desk in both Indiana and Texas.
Ransomware distributors are evolving their technique for using NSIS installers to package and execute malicious software such as Cerber and Locky, according to a new report from Microsoft.
A previously unknown ransomware family called PetrWrap has been discovered specifically designed to attack large organizations and capable of spreading the malware to its endpoints and servers.
More than three dozen Android devices have been found to contain 21 different types of malware, including Loki, that came pre-installed on the phone read-only memory (ROM).
A Florida man was arrested after allegedly shutting down a San Deigo software company's website and holding it for ransom.
Sixty-one percent of organizations polled in a survey from CyberEdge Group responded that they'd been hit by a ransomware demand, a third of those paid the ransom demand.
The Pennsylvania Senate Democratic Caucus has been attacked by ransomware, locking officials with the state organization out of their computers and rendering the group's website unavailable since Friday.
Researchers have spotted a sudden resurgence of the Windows-based ransomware CryptoLocker early this year, specifically identifying clusters of attacks targeting Italy, Dutch-speaking victims, and even the U.S.
The number of malicious installation packages found striking mobile devices more than tripled in 2016 resulting in almost 40 million attacks by malicious mobile malware during the year, according to Kaspersky Labs.
Apple released a security update on Tuesday to patch a flaw in Logic Pro X, the company's software for audio professionals.
Those who may have jumped on the company's free Valentine's Day offer beware.
A new survey shows that just 3 percent of IT security professionals believe their organization has the technology in place to deal with the most common cyber problems that they face.
A Maryland state senator introduced legislation that would levy heavy prison sentences and large fines against those convicted of ransomware attacks.
Researchers have detected that Sage ransomware shares infrastructure with another already notorious malware, Locky.
A newly discovered derivative of CryptoMix ransomware, dubbed CryptoShield 1.0, is reportedly one of the latest malicious tools to be adopted by the ElTest malware campaign. And while it's name may convey images of protection, it is very much used an an offensive weapon.
Cybersecurity concerns hit the big time in 2016.
Ransomware attacks quadrupled in 2016 and will double again in 2017, according to a report from insurance provider Beazley.
The CCTV cameras police in D.C. use to monitor public areas were shuttered for three days earlier this month when a cyberattack hit the system's network of recorders.
Only 52 percent of internet users who've lost money to cyber-criminals have only received some, or none, of their stolen funds back.
VirLocker ransomware is nasty, but a free solution is on offer, according to a blog post from Malwarebytes Labs.
The little-known Sage ransomware may be starting to hit the big time as reports state an upgraded version, Sage 2.0, has been spotted being spread by the same actors that normally distribute Locky, Cerber and Spora.
A ransomware infection has effectively paralyzed the St. Louis Public Library System, affecting 700 public computers in 16 locations and preventing visitors from checking out books or browsing the Internet.
Perhaps as part of a last desperate attempt to make their way onto Santa's "nice list" cybercriminals seemingly took a break in December, particularly in the amount of ransomware being distributed.
The long-lived ElTest malware campaign that infects victims through compromised websites evolved once again in the last quarter of 2016, ending its use of exploit kit gates and obfuscation, according to researchers with Palo Alto Networks' Unit 42 threat research team.
Ransomware victims are still finding themselves in the unfortunate position of having to decide wither or not to fork over ransom payments, despite some new tools that have come online designed to help victims both before and after attacks.
Kaspersky and Bleeping Computer researchers spotted a ransomware that works offline and uses a uniquely sophisticated payment site.