Microsoft gets busy on fix for IE watering hole attack
Malware can take ugly leap forward to virtual machines
Flame spy virus gets order to vanish: experts
US computer security researchers said Sunday that the Flame computer virus that smoldered undetected for years in Middle Eastern energy facilities has gotten orders to vanish, leaving no trace.
Bitdefender researchers find evidence of viruses infecting worms creating new form of malware
Team develops a simple defense for complex smartphone malware (w/ video)
(Phys.org)—University of Alabama at Birmingham (UAB) researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking smartphones. The Tap-Wave-Rub (TWR) methods – tapping, ...
Microsoft Security Essentials misses AV-Test Certified status
Google vision of password rings heard at security event
Researchers create 'Frankenstein' malware made up of common gadgets
Hackers pick Google's pocket with Mac virus
A virus infecting Macintosh computers is picking Google's pocket by hijacking advertising "clicks," tallying as much as $10,000 daily, according to Internet security firm Symantec.
Cybercriminals target phones, Android 'most exposed'
Cybercriminals are sneaking a fast-increasing amount of malware into smartphones to steal data or even money, with those running on Google's Android most exposed to security threats, analysts said.
Cyber-security expert finds new flaw in smartphones
Just as U.S. companies are coming to grips with threats to their computer networks emanating from cyber-spies based in China, a noted expert is highlighting what he says is an even more pernicious vulnerability in smartphones.
Distributed Credential Protection: Trying to beat the hackers and protect our passwords
Internet censorship revealed through the haze of malware pollution
On a January evening in 2011, Egypt with a population of 80 million, including 23 million Internet users vanished from cyberspace after its government ordered an Internet blackout amidst anti-government protests ...
Spear phishing: Researchers work to counter email attacks that gain recipients' trust
(Phys.org)—The email resembled the organization's own employee e-newsletter and asked recipients to visit a website to confirm that they wanted to continue receiving the newsletter. Another email carried ...