The underground economy that sells fake Twitter and other social media accounts is now so large that is it easily making millions of dollars for the leading abusers, an updated study by Barracuda Networks reports.
Google has bolstered its increasingly important Transparency Report with a new section that documents the number of malware and compromised websites, but its insights don't reveal all the nuances of Internet security.
Ransom malware has apparently jumped from the PC world where it torments millions of Windows users to the mobile world, where it has similar designs on Android.
Several of the Internet's most dangerous malware threats are now routinely using peer-to-peer command and control in an effort to evade the detection and shutdown that has affected many conventional botnets, security firm Damballa says.
The firm's alternative is to run traffic through its security layer, the Direct-to-Cloud Network, now extended in the form of the new Mobile Security Solution.
Twitter's long overdue rollout of two-factor authentication doesn't plug every angle of attack and won't guarantee that customer accounts aren't compromised in future, experts have warned.
The FBI has reportedly briefed U.S. bank executives on a wave of cyberattacks that have lashed the industry since last summer as part of a new policy designed to foster cooperation between the state and private sectors.
Four members of the infamous and largely British LulzSec hacking group that carried a string of high-profile DDoS attacks in 2011 have been handed relatively lenient prison terms.
Internet criminals have opened a new front in Latin America and the Caribbean and seem to have founded booming businesses thanks to low levels of cybercrime protection and awareness, a rare but timely analysis of the region by Trend Micro has found.
The sophistication of threats has risen dramatically since 2010 with the discovery of Red October, Flame, MiniFlame, Gauss, Stuxnet, Duqu, Shamoon and Wiper, among others.
Imperva's system analyzes attack patterns detected hitting the networks of participating customers.
Novell is preparing to release Filr, a new on-premise file-sharing product for companies that want the convenience of a Dropbox while keeping internal control over data.
The software industry’s inability to reduce the number of security flaws in its code is fueling an age of the "everyday hacker" who can exploit vulnerabilities with a minimum of technical skills, according to security testing firm Vercode’s latest State of Software Security report.
The prodigious Shylock banking Trojan is still being upgraded and is apparently moving from its traditional targets in UK financial services to foreign ones, Symantec reports.
Despite the widespread and well-publicized exploitation of vulnerabilities in Java, large numbers of organizations continue to use versions that are weeks, months, or even years out of date, a Websense survey of its customers reports.