Polymorphic malware may be a serious threat, but some of the strategies used to create it could be applied to malware defenses, as well.
After four years, the US-EU Umbrella Agreement for cybersecurity is making progress. Soon, malware creators may have nowhere to hide.
The Dyre Trojan is a great example of a threat that combines sophisticated tactics with an impressive strategy, resulting in a worthy cyber opponent.
A new remote-access Trojan (RAT) named Moker has been discovered by security researchers — and has skittered past every security measure used.
The White Team revealed themselves to be the developers behind Linux.Wifatch, the vigilante malware that was protecting routers from attacks.
A webmail server vulnerability affecting Microsoft's Outlook Web Access may provide cybercriminals with an entry point into corporate networks.
Threat sharing is getting more and more attention from security professionals to detect and quickly respond to security threats.
Ransomware has worked for cybercriminals for many years, and it continues to be a valuable tool in their arsenal as it evolves to suit the times.
A hacker may be helping protect unsuspecting users from malware through the Linux.Wifatch router virus, which protects home networks from botnets.
An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?