If it doesn't have permission to overwrite the MBR, the malware destroys all files in the user's home folder.
Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.
Experts on a cryptography panel at the RSA conference reject the idea of the U.S. government holding encryption keys.
Both operations required coordination between government agencies and private sector partners.
A recent survey found that 55 percent of organizations that have been hit by such attacks recommend negotiating with cybecriminals to restore data.
The campaign targets organizations with a combination of social engineering and DDoS attacks.
The target distribution 'strongly aligns with nation-state/political-group interests,' according to Check Point researchers.
The attack exploits an old ActiveX vulnerability, according to Symantec researchers.
The malware installs a keylogger and scans the infected device's memory for credit card data.
Dropbox patches flaw that could have exposed users to risk.
Avast debuts free Business Anti-Virus, but what's the catch?
The company says it has investigated the software and hasn't found 'any evidence to substantiate security concerns.'
The group's tools are capable of reprogramming hard drive firmware, allowing infections to survive disk formatting and OS reinstallation.
Crowdstrike's Global Threat Intel report details tactics used in nation-state attacks.
Rahul Sasi has tested the malware on the DJI Phantom and Parrot AR.Drone 2.0.
Dell SecureWorks has outlined a list of steps for organizations to take to mitigate the threat.
Hackers find new twists for some of their favorite tools, like malware and DDoS, which means organizations need to get even more serious about security in 2015.
Crowdstrike CTO Dmitri Alperovitch explains how his company's newest Falcon platform improves security with detection and prevention.
Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.
The FBI warning appears to refer to last week's cyber attack on Sony Pictures Entertainment.
Email is one of a hacker's favorite tools, so companies must be smart about thwarting email-generated cyber attacks.
According to the Guardian, the leading suspects are the U.S., the U.K., or Israel.
The Trojan looks for processes linked to KeePass, Password Safe, and the neXus Personal Security Client.
To fight malware, security teams must understand it. Here are five especially nasty forms of malware.
The malware has already been downloaded more than 350,000 times.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?