The evolution of the new and difficult-to-detect category of fileless malware may soon take an insidious turn with the development of what some researchers are calling vaporworms.
SEO poisoning is on the rise again. How do threat actors use search engine results to drive victims to malicious sites, and what can users do to protect themselves?
A survey of Black Hat attendees showed that many security experts doubt the ability of antivirus protection products to detect ransomware.
Manufacturers have long used and abused bundling software to collect placement fees from software marketers. Implicit in the bundling is the belief that the software will be beneficial to the user in some way — or at least cause them no obvious...
After a long transition period, Microsoft has ended anti-malware protection for Windows XP, meaning users should move quickly to protect machines using it.
Adware programs that are designed to render advertisements on end user systems emerged as the second-most prevalent security threat in 2014.
Legacy anti-malware solutions tend to lack context, resulting in false-positive alerts that are ignored and real threats that are overlooked.