For the second time in five months, the Transmission BitTorrent client for Mac has been infected with malware.
WikiLeaks published more than 80 variants of malware in the second email dump from Turkey’s ruling political party (AKP), according to anti-virus security expert Vesselin Bontchev.
There have been reports of malicious Pokémon Go apps out in the wild since the game was released over a week ago, but more of them are popping out of the brush than Caterpies just out of Pallet Town.
People all over have been trying to enjoy the new Pokémon Go app, which released this week to so much fanfare that it’s experiencing massive server overload. The hype was so real that people were passing around APK files so that people outside the countries where it’s available could side-load it on Android, something…
In 2009, malware called “Skimer” surfaced and security firms took notice. Skimer is essentially malware that gives hackers full access to an ATM without needing to install any physical hardware, like a card skimmer. According to a new investigation by Kaspersky Lab, the malware is not only seems in use, but it’s also…
The hackers behind a large-scale Bangladesh bank hack went further than simply stealing money. Now it turns out that they created malware that could compromise the way in which international banks use the SWIFT payment system.
You’ve got to admire Google’s honesty. Right now, the company’s own safe browsing tool is flagging “google.com” as partially dangerous. Does that mean your computer is doomed if you need to Google search for “that funny video you saw that one time about a cat or something?” Likely no, Google—like lots of websites—is…
Better watch where those fingers fall on the keyboard next time you type out a URL. Security researchers have discovered a new trend they’re calling typosquatting, where users are attacked after they mis-type web addresses.
The wireless link between your mouse and dongle might not be as useful as you think. A new hack shows that the links are often unencrypted and can be used to gain control of your computer.
Ransomware is one of the nastiest forms of malware around: once it’s downloaded onto a computer network, it runs around encrypting all your files, before charging a Bitcoin ransom to give up the encryption key: bad if it’s your holiday photos at stake, disastrous for hospitals and patient data.
It’s been a bad week for people’s phones, and it’s not getting any better: A Danish security firm’s found malware that ravages your Android phone with a single text—erasing data or sending rogue calls and texts.
The early internet was truly a technological frontier, ripe with amazing ideas and equally amazing malware. Now, pesky code that used to attack your plastic, beige internet box is safely stored in The Malware Museum. Best part? Admission is free.
On December 23rd, a large swathe of Ukraine suffered a massive power outage. This week, it’s come to the light that it could have been the result of destructive malware.
If you’ve stayed at a Hyatt recently, you may want to check your bank statements. The chain has admitted that it’s identified malware on the computers that are used to operate payment processing for its hotels.
A new kind of point-of-sale malware, which uses multiple layers of obfuscation and encryption to cover its tracks, has been identified by security researchers—and is being help up as the most complex software of its kind yet to be identified in the wild.
The App Store is a pretty well-fenced garden, which means it’s big news when someone manages to pull off a heist. But that’s what InstaAgent, a third-party app that would let you see who was viewing your Instagram profile while skimming your password, seems to have done.
Security researchers have come across a new kind of Android malware, which purports to be a well-known app but then exposes your phone to root attacks—and is virtually impossible to remove.
Apple cleaned the App Store of apps containing malware today, having discovered a long con that saw developers using infected software tools, inadvertently turning their legit apps into data-collection tools for hackers.