Android Tablets Sold on Amazon Infected with Cloudsota Trojan

The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.

Ransomware Is Now the Leading Mobile Malware Threat

And porn sites are now the top mobile infection vector, according to Blue Coat.

CryptoLocker Spawns Endless, Awful Variants

CryptoLocker is the granddaddy of ransomware, and thieves are developing new and more dangerous variants of it.

Cisco Disrupts Infrastructure Behind $60 Million Ransomware Campaign

The researchers found that 'an inordinate number of proxy servers' used by the Angler Exploit Kit were on servers belonging to Limestone Networks.

Millions Infected by Malware in Apple App Store

The malware is capable of launching phishing attacks and stealing data from the user's clipboard.

225,000 Apple Credentials Stolen via New iOS Malware

It's the 'largest known Apple account theft caused by malware,' according to Palo Alto Networks researchers.

Kaspersky Responds to 'Fake Malware' Allegations

'They forgot to add that we conjure all this up during steamy banya sessions, after parking the bears we ride outside,' Eugene Kaspersky wrote.

HP on Legal Hacking and the Law

HP's Zero Day Initiative buys a lot of security vulnerabilities from researchers – so how does it stay within the bounds of the law?

FBI Details Takedown of Gameover Zeus Botnet

FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.

Yahoo Ads Serve Malware for Second Time in Two Years

Malicious ads were found to be redirecting victims to the Angler Exploit Kit, according to Malwarebytes researchers.

Can New Intel Tech Revolutionize Application Security? [VIDEO]

Steve Grobman, Intel Fellow and CTO of Intel Security, discusses upcoming innovation in silicon that could have a huge impact on software security.

Flash Malware Surges, Finds Cisco

While Flash exploits are up, Java is going the other way, according to Cisco's MidYear Security Report.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Trend Micro Warns of New MalumPoS Point-of-Sale Malware

The malware currently targets Oracle MICROS and other point-of-sale systems.

Sally Beauty Details Malware Attack That Led to Recent Data Breach

The company says malware was 'effectively deployed' on some of its point of sale systems between March 6 and April 17, 2015.

New Rombertik Malware Destroys Master Boot Record If Debugged

If it doesn't have permission to overwrite the MBR, the malware destroys all files in the user's home folder.

Startup Spotlight: Prevoty's Application Security

Despite the growing importance of applications, the application layer is a "black hole" of enterprise security, says company's co-founder.

Cryptographer Panel Slams Government Key Escrow Idea

Experts on a cryptography panel at the RSA conference reject the idea of the U.S. government holding encryption keys.

International Operations Take Down Beebone, Simda Botnets

Both operations required coordination between government agencies and private sector partners.

Police Department Pays Cybercriminals Following Ransomware Infection

A recent survey found that 55 percent of organizations that have been hit by such attacks recommend negotiating with cybecriminals to restore data.

IBM Warns of New 'Dyre Wolf' Malware Campaign

The campaign targets organizations with a combination of social engineering and DDoS attacks.

Researchers Warn of Volatile Cedar APT Campaign

The target distribution 'strongly aligns with nation-state/political-group interests,' according to Check Point researchers.

New Trojan Targets Petroleum, Gas, Helium Companies

The attack exploits an old ActiveX vulnerability, according to Symantec researchers.

Cisco Warns of PoSeidon Point-of-Sale Malware

The malware installs a keylogger and scans the infected device's memory for credit card data.

IBM Exposes Critical Dropbox Vulnerability

Dropbox patches flaw that could have exposed users to risk.