A spreading exploit uses the Windows AutoRun feature, but security experts say it may be spreading through simple file-sharing since the newest versions of Windows 7 will not launch autorun.inf files.
Updating your browsers and clamp down on plug-ins, experts say.
Anvisoft, a Chinese antivirus startup, has been linked to an infamous hacker suspected of developing sophisticated malware used to siphon sensitive information from Defense Department contractors in 2006.
Android 4.2 'Jelly Bean' uses trusted third-party to vet apps, unlike Apple's own internal review of App Store apps
Android Security Suite Premium - loaded with Zeus variant ZitMo - is a threat to companies given the bring-your-own-device (BYOD) trend.
Security researchers at Vupen say they've identified a flaw in Windows 8 that allows remote code execution. The complexity of the operating system means it's unlikely to ever be bulletproof, the security firm says.
Hackers are stealing customer credentials through malware installed on mobile phones and PCs in phishing attacks.
Courts are becoming open to holding companies liable for damage their customers suffer in data breaches caused by careless security efforts.
Security experts say Windows 8 is the most secure Microsoft operating system to date, but that doesn't mean malware won't evolve to exploit it.
Verizon says data-gathering does not violate Wiretap Act because the data cannot be linked to a single customer, but advocates are crying foul.
A rift has developed between WikiLeaks and the hacker collective Anonymous, threatening a partnership that the rebel groups have leveraged in their self-described campaigns against government secrecy and corporate malfeasance. Anonymous is annoyed at a donation page on the WikiLeaks site and believes the organization is too focused on its founder, Assange
U.S. Bank's website was among several disrupted last week in a people-powered distributed denial of service attack, launched by a group of Islamic hacktivists.
No patching before release meant the forthcoming operating system would be vulnerable to attack immediately after it was made available
The new name in fraud has become the top threat globally in the first quarter of this year, accounting for 62% of all application-based threats.
Agency denies theft of laptop with Apple unique device IDs, but one expert believes says, 'It would be hard to fake such data'.