Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
Protecting corporate credentials is becoming increasingly important as more high-profile breaches have compromised hundreds of millions of user accounts.
An attempt to distribute malware via online ad network DoubleClick and Zedo could be a possible example of "malvertising" targeting consumers through ads.
IBM Security Trusteer researchers recently discovered a new Tinba variant exhibiting new, exciting features and making waves in an active malware campaign.
SalesForce is warning its customers that they might have been targeted by the Dyre Trojan. Banking trojans are not just targeting financial organizations.
According to IBM Trusteer researchers, massively distributed Citadel malware is targeting nonfinancial petrochemical companies in the Middle East.
There's no such thing as a "free" app. What data are free mobile apps collecting, how is it used and what can companies do to protect themselves?
As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
According to a recent Secret Service and Department of Homeland Security release, the Backoff hacker tool is still alive and well in American POS systems.
Community Health Systems has reported that it was the target of a data breach, demonstrating how vulnerable the health care industry is to attacks.