Researchers have shown how HTML5 could be used to hide malware through a series of obfuscation techniques that antivirus tools can't detect.
A pair of eBay vulnerabilities could have let cybercriminals hide malware in image files and direct URLs to harmful sites, according to a researcher.
IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
As point-of-sale malwares continue to crop up, it is important to maintain the security of these systems to protect them.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Maintaining the security of POS systems is a growing concern: The Dexter malware has been found to target customers' payment information.
Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.
With hundreds of millions of users, Twitter is one of the largest social networks, so it's no surprise that Twitter malware attacks are on the rise.
LinkedIn spam emails exploit users' tendency to follow links from social networks, then steal sensitive data from their computers.