Commercially available surveillance tools pose a mobile malware threat to enterprise data, according to a recent report from Lacoon Mobile Security.
More than 75 percent of enterprises have been infiltrated by browser-borne malware. What steps can companies take to protect against broken Web browsers?
Organizations' mobile authentication methods must take risk levels and context into account in order to determine whether device access is legitimate.
When discussing the darknet, the focus has shifted from its use as infrastructure for malware communication to the hidden services it offers.
A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
After reviving the Regin dispatcher module, Mark Yason ended up with a malware sample that was suitable for both static and dynamic analysis.
Cybercriminals are using a porn video to tag victims in Facebook posts to fool them into downloading a phony Flash update and spread a malicious Trojan.
The FBI says ransomware is targeting consumers and businesses and spreading via pop-up windows on websites instead of just email spam.
Wiper malware can destroy important data and cripple computer systems. It was most recently used in the high-profile breach against Sony Pictures.
Financial malware is on the rise, according to a new Trusteer study that takes a hard look at the life cycle of these fraudulent transactions.