The Trojan uses Webmail, blogs and message boards as conduits for spreading malware code.
Integrating Web and desktop creates 'perfect storm' for future flaws, researcher says.
Symantec warns on a vulnerability in some home broadband routers.
Regulators warn online brokerage frauds on the rise.
Consumer data, including credit card info and driver's licenses, has been stolen from the retailer.
Will data minimization be the key to enhancing data security? Experts say it's a trend to watch.
'Cancer patients are big money' for ID thieves, privacy expert warns.
First Vista exploit could mean lasting problems for Microsoft, according to a security vendor.
UPDATED: A New Year flaw raises URL-handling issues in the media player.
The OS is proving not to be as unsinkable as Microsoft claimed.
UPDATED: A new Word vulnerability targets Windows and Mac users, according to software maker.
UPDATED: Original AirPort opens wireless users to attacks, according to Apple.
An ActiveX vulnerability is being exploited, security researchers say.
Microsoft says its security 'is no silver bullet.'
Assessment program hopes to replace cumbersome and costly individual interviews with standards-based requirements.
UPDATED: Small number of video iPods affected, Apple says.
This week's patch release targets may include high-profile flaws in Windows and Office.
As Microsoft waits, unofficial patches become an established answer to sudden security threats.
Is espionage behind the latest attacks?
The company alerted 50,000 current and former employees that a stolen laptop held names and Social Security numbers.
Although first wave of attacks subside, security vendors expect more are on the way.
Zero-day exploit draws mixed concern from security vendors.
Revised security bulletin addresses problems experienced by some XP users, according to the software maker.
New software exploit could be first to target the popular BlackBerry e-mail device.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?