Cybercriminals have inserted government-grade malware into run-of-the-mill ransomware and online banking Trojans to bolster their ability to avoid detection and block tampering.
Stories by Antone Gonsalves
IBM researchers have developed a technique that website operators, cloud service providers and mobile application developers could use to spot a fraudster who has stolen an account holder's credentials.
A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious software, experts say.
Depending on their OAuth implementation, social media sites, such as Google, LinkedIn and Yahoo, could share users' personal information with malicious third-party websites, experts say.
Companies faced with the threat posed by networking equipment that contains the notorious Heartbleed bug have few security options beyond working closely with affected vendors, most notably Cisco Systems and Juniper Networks.
Symantec has declared 2013 the year of the "mega-breach," placing security pros on notice that they stand to lose big from phishing, spear-phishing and watering-hole attacks.
The data breaches like the one at Target and more recently a unit of credit bureau Experian are fueling consumer protection efforts that could have an impact on business.
Microsoft's combination of application reputation technology and URL filtering gave Internet Explorer a malware block rate that blew pass Google Chrome, Mozilla Firefox and Apple Safari.
Google has made it clear that commercial Android apps sold on the Play store are not allowed to secretly track user activity.
A government request to change federal court rules to make it easier to hack into computers during criminal investigations places a new twist in the debate over privacy rights versus fighting crime in the digital world.
A sobering think-tank report on the evolution of cybercrime and the supporting marketplaces on the dark side of the Internet depicts a criminal complex growing more sophisticated in software tools and its ability to hide from law enforcement.
A remote access tool used to commandeer a Windows PC has been found to also include an Android component, an indication that hackers are seeking cross-platform RATs for PCs and mobile devices, a researcher says.
Connecting to unsecured networks not advisable for Apple users until patch is released for vulnerability
The latest details from the Target breach investigation raises questions as to the security the retailer had in place for third-party vendors accessing its partner portal and billing system.
The European Union's executive body has come out in favor of lessening U.S. influence over the Internet infrastructure, a move brought on by revelations of U.S. National Security Agency surveillance of online activity.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.