A new vulnerability called ROPEMAKER could enable threat actors to replace a benign URL with a malicious one after an email has already been sent.
A security researcher recently discovered a software vulnerability that allows attackers to exploit the way applications respond to HTTP CONNECT requests.
The Angler exploit kit has been responsible for the vast majority of botnets created over the past year. Here's how it works and how to stop it.
Researchers have shown how HTML5 could be used to hide malware through a series of obfuscation techniques that antivirus tools can't detect.
As the mainstream media continues to cover bitcoin exchange as a popular Web currency, cyber criminals are increasingly doing the same to launder money.
Like ICBM missiles, multistage exploit kits first launch a nonthreatening stage and then use the second stage to inflict damage without raising suspicion.
A new Tatanga Trojan recently emerged, which uses a MitB attack to bypass mobile security in bank transactions. The scam is commiting fraud in Germany.
SpyEye uses a technique called HTML injection to modify the pages presented in victims' browsers and capture credit card information.