Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.
What’s the difference between IDS, firewalls and antivirus? This guide should explain how they complement each other in a balanced security setup.
Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.
A new advanced malware program targeting point-of-sale terminals is putting customer credit card details at risk, following a number of similar attacks already this year.
A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.
Advanced persistent threats (APTs) are a growing concern to the world’s companies and networks. This recorded webinar looks at real-world data breaches resulting from APTs and how multi-layered proactive detection can combat this threat.
The Operation Buhtrap campaign targets a wide range of Russian banks, used several different code signing certificates and implements evasive methods to avoid detection.
Gamers downloading from Steam should beware of fake game pages, after a spate of clone titles were found on the service hiding harmful malware.
If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.
Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports The Next Web.
Energy companies have been targeted with a new multi-stage malware attack used to infect company computers and steal sensitive data.
Point of Sale credit card terminals are under threat from a new malware named PoSeidon, thought to be more dangerous than the Zeus exploit kit that was used to steal millions of card details from Target customers.
A vulnerability has been detected in the BIOS chips found in millions of computers which could leave users open to hacking.
Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.
Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.
How can phishing exploits and botnets affect a business?