Microsoft is planning to make its internally-used ‘white-box fuzzing’ bug-detection service available to external customers and partners. Microsoft is looking for testers...
Researchers have found a new strain of document-based macro malware that evades discovery by lying dormant when it detects a security researcher’s...
Terbium Labs’ software can now be used to detect when data belonging to companies is being flogged in the underground. Terbium Labs...
Interscatter Communication May Re-Define how Chronic Diseases are Managed — Benign everyday medical devices to communicate with smart tech to aid in ailment...
pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can...
The unusual malware has been specifically designed to target the core systems cities rely on. A new family of malware has been developed...
In the half-decade that has lapsed since Dorkbot was first identified, millions of innocent victims, going about their everyday business, have been...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each...
A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware,...
Researchers at Blue Frost Security firm discovered a flaw in the FireEye Virtual Execution Engine (VXE) that allows an attacker to completely...
A new type of RAT (Remote Access Trojan) has been discovered in use against governments and civil society organizations in South-East Asia,...
Zscaler ThreatLabZ detected a new infostealer malware family dubbed Spymel that uses stolen certificates to evade detection. In late December, security experts...
A previously undetectable remote administration tool has been uncovered, dubbed “GlassRAT” The zero-detection Trojan appears to have operated stealthily for three years,...
Researchers warned Tuesday the latest APT to make the rounds features a remote access Trojan that can effectively mitigate security measures on machines and grant...
Short Bytes: Lockheed Martin has decided to open source its secret cyber threat detection tool Laika BOSS at the Black Hat Conference...
Advanced persistent threats (APTs) are a growing concern to the world's companies and networks. This recorded webinar looks at real-world data breaches...
The new on-body detection feature will lock your phone when you set it down, so thieves who swipe it can’t access your...
Malware may begin to offer genuinely helpful functionality in the future, in order to "fly under the radar" and fake legitimacy before...
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor...
Android-specific software that checks for Carrier IQ could create an unanticipated problem.