The McAfee 2013 Most Dangerous Celebrities report is out. Here's how to avoid becoming a victim.
The Obad.a Android Trojan identified in June turns out to have the innovative and predatory capability to piggyback on malware botnets.
The attack campaign, which has been dubbed “Kimsuky,” involves the use of malware to steal sensitive information from South Korean research institutions.
Android malware is following in the footsteps of Windows malware with attackers adopting some of the same distribution and monetization techniques despite the major differences between the platforms.
The antivirus and security company refreshes its core consumer products with an upgraded anti-malware engine and improved scanning performance.
The spike is likely being caused by a botnet, according to one of the original Tor developers.
In a study conducted by TNS Global for Halon, an email security service, 30 percent of those surveyed admitted they would open an email, even if they were aware that it contained a virus or was otherwise suspicious.
A malicious app is apparently being used to distribute mobile spyware on the popular via the free classifieds site.
Image-manipulation software is being used to create counterfeit scanned documents to aid cybercriminals in fraud efforts.
A wave of cyberattacks against Israeli and Middle Eastern targets this summer was the work of a highly active but shadowy hacktivist group that has started using Remote Access Trojans, security firm FireEye has warned.