Written By Shane Schick

State of the Union 2015: What Obama Will Say About Cybersecurity

The Jan. 20 State of the Union address is expected to focus on the fight against cybercriminals and malware in the wake of recent data breaches.

DarkComet Malware Weaponizes #JeSuisCharlie Effort

Security researchers say cybercriminals are using the #JeSuisCharlie hashtag's popularity to distribute the DarkComet malware to unsuspecting victims.

Skeleton Key Malware Provides Scary Attack Method on Active Directory Users

Organizations that only use single-factor authentication for Microsoft Active Directory access could fall victim to the Skeleton Key malware.

Pastebin a Convenient Way for Cybercriminals to Remotely Host Malware

Experts say cybercriminals are using a popular online repository called Pastebin to act as a remote server for hosting malware aimed at WordPress users.

FTC Chairwoman: Internet of Things Poses Security Risks

FTC Chairwoman Edith Ramirez says the Internet of Things could bring many benefits, but companies need to think early and often about security issues.

iDict Creator Claims Tool Was Meant to Make Apple Improve iCloud Security

A cybercriminal claims the iDict tool was only created to force Apple to deal with a vulnerability in iCloud that allowed brute-force attacks.

‘Blackhat’ the Movie to Bring IT Security to the Big Screen

Michael Mann's upcoming "Blackhat" the movie has a life-imitates-art quality based on recent hacking events, such as the devastating Sony Pictures attack.

OphionLocker Ransomware Uses Advanced Encryption to Hold Data Hostage

Security researchers said a recently discovered strain of ransomware called OphionLocker uses some of the most advanced cryptography yet developed.

Report: Volume of Web Attacks Rose by More Than 1 Billion in 2014

Web attacks struck 38 percent of all computer users this year, an overall rise of 1 billion from 2013, as cybercriminals become more focused on banks.

Security Researchers: Google App Engine May Contain More Than 30 Vulnerabilities

Holes in Google App Engine could allow third parties to access or steal information from the company's cloud-based service for hosting Web apps.