Proofpoint, a provider of Security-as-a-service solutions, on Thursday announced “Proofpoint Targeted Attack Protection”, a new cloud-based security solution designed to provide protection against spear...
Researchers at Trend Micro have discovered a malicious PowerPoint file circulating via email, which if executed, installs a backdoor on the victim’s system. The...
Flame's controlled burn through computer systems around the world may have started with command and control (C&C) domains registered as early as 2008, according...
CSIS Security Group researchers have discovered what they are calling the "World’s smallest trojan-banker," a piece of malware that proves dangerous things can come...
"IXESHE" Attack Campaign Leveraged "Weaponized" PDFs Targeting Zero-day Exploits Dating Back to 2009.Trend Micro has revealed details on a series of attacks that tried...
Researchers at F-Secure have discovered a PDF being circulated online that is using the upcoming Olympic summer games in London as bait. The interesting...
McAfee recently released its quarterly threats report for Q1 2012, detailing the increase in malware across all platforms. According to the data, PC-based malware...
The popularity of the Android platform, combined with the openness that it represents, has created model that allows developers of all shapes and sizes...