Fox-IT spots similarities in the code of several pieces of malware and suggests the source is an imprisoned hacker.
Businesses considering accepting Bitcoins or other forms of cryptocurrency should be prepared to battle a rising number of malware aimed at emptying digital wallets.
The rootkit works on 32-bit and 64-bit Windows versions and protects the malware's components from being deleted.
Researchers used a specially-crafted virus called ‘Chameleon’ to attack access points, which could then spread the malware along wirelessly.
Using TOR makes it more difficult to trace the command-and-control server
Around 350,000 credit and debit cards were exposed in the incident -- not 1.1 million as first feared.
What's in a name? For one security expert, not enough when the name is "malware."
Where's My Droid and Speed Night were cited as the most downloaded malicious apps.
Analysis finds that Google Play still battles apps bearing malware, but the estimates vary with the research.
The exploit is embedded into documents distributed as email attachments, researchers from Kaspersky Lab said.