State-sponsored cyber threats generally don't target private businesses, but that doesn’t mean they can't harm you or your company.
Three people allegedly involved for years in cybercriminal activities in Eastern Europe have been charged in a U.S. court for creating and distributing the Gozi virus that infected more than 1 million computers and allowed cybercriminals to steal millions of dollars over a five-year period.
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers.
Two U.S. power companies reported infections of malware during the past three months, with the bad software apparently brought in through tainted USB drives, according to the U.S. Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).
This piece of malware has been stealing data from diplomatic, government, and scientific research computer networks for more than five years.
An increasing number of vulnerability researchers will focus their attention on industrial control systems in the year to come, but so will cyberattackers, security experts believe.
Rootkits are particularly insidious and hard to eradicate. A tool like GMER—one that is dedicated to detecting and removing rootkits—is often a better way to handle a suspected rootkit infection.
Davikokar launched a program even though Norton warned that it was a Trojan. A subsequent hard drive scan revealed nothing bad. Davikokar then asked the Antivirus & Security Software forum if Norton had given a false positive?
Security researchers from antivirus vendor Trend Micro have uncovered a piece of backdoor-type malware that infects Java-based HTTP servers and allows attackers to execute malicious commands on the underlying systems.
Microsoft has launched a new anti-piracy campaign in China, which intends to highlight the security risks of buying counterfeit software.