As more and more people share private information on social media, cybercriminals are working to monetize information obtained from social networks.
According to a recent Secret Service and Department of Homeland Security release, the Backoff hacker tool is still alive and well in American POS systems.
Community Health Systems has reported that it was the target of a data breach, demonstrating how vulnerable the health care industry is to attacks.
The chaos of Black Hat is just like the chaos of the information security industry. How can one decide which security company to partner with?
Black Hat 2014 illuminated the vulnerabilities of the Internet of Things, according to two IBM researchers who attended the conference.
A new Bugat malware variant is using techniques similar to the Gameover Zeus HTML injections to target banking applications and steal user credentials.
Although many organizations have a policy that prohibits reusing corporate credentials on third-party sites, these password rules are hard to enforce.
Citadel, a type of malware, can now persistently have remote control of devices, which is an advanced threat that can affect many victims.
Researchers at Trusteer, an IBM company, recently discovered the Kronos malware, which offers compatibility with Zeus, in a Russian cyber crime forum.
Researchers have discovered two additional variants of Boleto malware that operate quite differently from the previously discovered Eupuds malware.