Image-manipulation software is being used to create counterfeit scanned documents to aid cybercriminals in fraud efforts.
A wave of cyberattacks against Israeli and Middle Eastern targets this summer was the work of a highly active but shadowy hacktivist group that has started using Remote Access Trojans, security firm FireEye has warned.
With more smartphones shipping than PCs, mobile ad networks open up the perfect backdoor for downloading code
Windows, with its greater levels of adoption, has long been the preferred target of hackers; for the mobile world, that dubious title clearly now goes to Android, security researchers say.
In a new post, Microsoft reminds users--again--that Windows XP support ends in April. But this time, Microsoft attempts to demonstrate the security risks of XP.
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab.
Mobile ad networks can provide a loophole to serve malware to Android devices, according to researchers from security firm Palo Alto Networks who have found new Android threats being distributed in this manner.
The Dalai Lama's Chinese language site has been hacked and infected with spyware.
Ads and toolbars are the scum and villainy of the browser world. Eliminate them quickly and make sure they never come back with these simple tips.
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense contractors, has launched new attacks following a few months of inactivity, according to researchers from security vendor FireEye.