Fox-IT spots similarities in the code of several pieces of malware and suggests the source is an imprisoned hacker.
Researchers used a specially-crafted virus called ‘Chameleon’ to attack access points, which could then spread the malware along wirelessly.
Amazon's 50 top-selling routers are open to attack, researchers at Tripwire report.
Recent data theft prompts companies to evaluate new ways of protecting customer information (but not as many as you'd think).
Report finds improvement but is is enough?
Analysis finds that Google Play still battles apps bearing malware, but the estimates vary with the research.
Cybercrooks are again exploiting Java's cross-platform design to install and spread bots.
Reports on under-reported Russian activity
The low-key theft campaign is believed to have stolen $550,000 or more from about 400 victims, police say.
The USB OTG standard shows future of portable drives.
A copycat of the widespread Cryptolocker malware is taking aim at P2P file-sharers.
Third-party markets push cheaper, pirated or fake versions of popular apps.
Criminals are having trouble finding anything with the capabilities to take its place, security firm Websense has noticed.
Some clever cybercrooks and scammers are running domains with slightly misspelled names of known security firms.
Websense identifies the top come-ons and scams that still seem to work.
Articles by John E DunnNext Page