Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
The intricacies of kernel-based malware make it difficult for security teams to identify potential problems, but the task is not impossible.
While network-based security solutions provide protection for an enterprise's network, endpoint protection is needed to effectively combat advanced malware
According to IBM Trusteer researchers, there is a new type of Citadel malware that is compromising password management and authentication solutions.
According to IBM Trusteer researchers, massively distributed Citadel malware is targeting nonfinancial petrochemical companies in the Middle East.
A new study reports many IT security professionals are pessimistic about their ability to reduce the frequency and severity of advanced persistent threats.
Today's advanced attacks are more targeted and complex than ever. When it comes to advanced threat protection (ATP), you need an integrated approach.
Organizations require an intelligent approach to protecting their critical data against advanced threats, zero-day attacks and breaches.
IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.