The ransomware TeslaCrypt was defeated by a community effort, but cybercriminals have fought back to create a version that can remain active.
A look back at data breaches in 2015 and some simple steps that can be the difference between investigating an alert versus investigating a breach.
Mitigating malware is possible for smartphone and PC users who follow a few simple computing hygiene tips and security best practices.
In a troubling new development, some tech support scammers may have begun using ransomware tools to increase their chances of cashing in on schemes.
A new infographic from IBM Emergency Response Services (ERS) details four of the top trends in cybersecurity — as well as some indicators of risk.
The latest 2015 IBM X-Force Threat Intelligence Quarterly focuses on the lessons learned from security research throughout the year.
Ransomware has worked for cybercriminals for many years, and it continues to be a valuable tool in their arsenal as it evolves to suit the times.
An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
Ransomware remains a common attack, and it will continue to be a popular choice for cybercriminals until enterprises improve end user education.