The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
In the wake of a reported data breach by hackers in Russia, individuals and companies should be on the lookout for these types of malicious attacks.
In early 2014 the world's second-largest email service, Yahoo Mail, reported a data breach into its users' email accounts.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Customers are at significant risk due to a recently reported Adobe breach.
Last week, the FBI issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors.
With hundreds of millions of users, Twitter is one of the largest social networks, so it's no surprise that Twitter malware attacks are on the rise.
The year just started, but already two major software vulnerabilities have made headlines. One concerns Java. The other is called Operation Red October.