The FBI plans to introduce a malware-analysis system this year to help businesses and the public share information about cyberattacks.
Malware activity has become so pervasive globally that attack servers are now hosted in 206 countries and territories.
Fox-IT spots similarities in the code of several pieces of malware and suggests the source is an imprisoned hacker.
Businesses considering accepting Bitcoins or other forms of cryptocurrency should be prepared to battle a rising number of malware aimed at emptying digital wallets.
The rootkit works on 32-bit and 64-bit Windows versions and protects the malware's components from being deleted.
Researchers used a specially-crafted virus called ‘Chameleon’ to attack access points, which could then spread the malware along wirelessly.
Using TOR makes it more difficult to trace the command-and-control server
Around 350,000 credit and debit cards were exposed in the incident -- not 1.1 million as first feared.
What's in a name? For one security expert, not enough when the name is "malware."
Where's My Droid and Speed Night were cited as the most downloaded malicious apps.