Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
Legacy systems and platforms can pose serious problems for businesses. Consider the security risks that can come with obsolete technology.
New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.
Today's IT professionals can extract many lessons from the infamous Stuxnet worm, which was discovered in 2010, to help them protect their SCADA systems.
Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
Security researchers discovered a Windows Trojan that spreads Mirai malware, identifies potential victims and provides an extra boost of processing power.
Windows XP, which hasn't been updated since 2014 and contains many well-known vulnerabilities, is the most common ATM operating system in India.
Fraudsters with deep pockets have been spreading malware to Tor users through signed DRM files that redirect victims' browsers without warning.
The botnet malware known as Ragebot, which notably uses IRC to control infected devices, has resurfaced with improved features.
The cybergang known as the Shadow Brokers is allegedly peddling a new zero-day Windows exploit. Is the threat credible enough to warrant blocking SMB?