The National Security Division of Department of Justice is creating a new position called the National Security Cybersecurity Specialist.
Bogus copies of Microsoft's operating system oftentimes end up as zombies within botnets and spread spam and malware beyond borders.
A criminal organization recently busted by law enforcement distributed malware on Facebook using two separate botnets built from tools that are easily found in the hacker underground, a security expert said. The operation shows that deep technical knowledge is not needed to run a lucrative botnet.
Out of more than 1,200 malware samples, Google's technology for scanning third-party smartphone apps detected only 193
The group claims to have stolen information from the Department of Homeland Security Information Network, the Federal Reserve and Interpol
The recent news about a data breach at Nationwide and Allied Insurance reinforces companies' biggest security fears, which includes worries about liability for loss of customers' private information. Some security experts suggest this is just the incentive that some companies need to implement better security measures.
Discussions in chat rooms used by Anonymous indicate members will attack the International Telecommunications Union's site on Dec. 8
A spreading exploit uses the Windows AutoRun feature, but security experts say it may be spreading through simple file-sharing since the newest versions of Windows 7 will not launch autorun.inf files.
Updating your browsers and clamp down on plug-ins, experts say.
Anvisoft, a Chinese antivirus startup, has been linked to an infamous hacker suspected of developing sophisticated malware used to siphon sensitive information from Defense Department contractors in 2006.
Android 4.2 'Jelly Bean' uses trusted third-party to vet apps, unlike Apple's own internal review of App Store apps
Android Security Suite Premium - loaded with Zeus variant ZitMo - is a threat to companies given the bring-your-own-device (BYOD) trend.
Security researchers at Vupen say they've identified a flaw in Windows 8 that allows remote code execution. The complexity of the operating system means it's unlikely to ever be bulletproof, the security firm says.
Hackers are stealing customer credentials through malware installed on mobile phones and PCs in phishing attacks.
Courts are becoming open to holding companies liable for damage their customers suffer in data breaches caused by careless security efforts.