A new variant of the Dyre Trojan, a type of massively distributed malware, is being used to attack victims using Microsoft Outlook in APT-style attacks.
According to a new report, Russian cybercriminals used spear-phishing attacks to breach Sony Pictures Entertainment at the end of 2014.
"Blackhat" the movie is an example of Hollywood getting hacking right, portraying many hacking scenarios that could be found in the real world.
The report of a 2014 attack on a German steel mill brings together several key points on the Internet of Things and motivations for cyberattacks.
Microsoft recently discovered a spam campaign spreading the notorious Trojan:Win32/Upatre downloader. Users are warned not to accept the wire transfer.
A cybercrime group has been systematically targeting email accounts belonging to high-ranking corporate executives with access to market-moving data.
The so-called Masque attack lures iPhone users to update their favorite apps, then replaces those apps with identical but malicious imitators.
In the wake of a reported data breach by hackers in Russia, individuals and companies should be on the lookout for these types of malicious attacks.
Between key-logging malware, phishing schemes and e-commerce sites, there are many ways cyber criminals can steal corporate credentials and commit fraud.
Customers are at significant risk due to a recently reported Adobe breach.