"Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
Microsoft recently discovered a spam campaign spreading the notorious Trojan:Win32/Upatre downloader. Users are warned not to accept the wire transfer.
A cybercrime group has been systematically targeting email accounts belonging to high-ranking corporate executives with access to market-moving data.
The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
In the wake of a reported data breach by hackers in Russia, individuals and companies should be on the lookout for these types of malicious attacks.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Customers are at significant risk due to a recently reported Adobe breach.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
With hundreds of millions of users, Twitter is one of the largest social networks, so it's no surprise that Twitter malware attacks are on the rise.