Trojan uses a key internet feature to receive marching orders
You can't easily stop this malware in its tracks.
Advertising's hottest surveillance software is surprisingly legal
SilverPush knows which ads you see on TV, the web, and much, much more.
iOS malware uses copy protection to infect 'pure' devices
AceDeceiver uses exploits in Apple's FairPlay system to install rogue apps, even without a jailbreak.
New strain of Android malware is 'virtually impossible' to remove
Most Android malware is bad enough, but new versions take advantage of root exploits to become so deeply embedded that even a factory reset won't get rid of them
Security firm discovers Linux botnet that hits with 150 Gbps DDoS attacks
It's the digital equivalent of hunting mosquitos with a hydrogen bomb.
Darkode cybercrime forum seized as police arrest 28 members
The FBI, Europol and law enforcement from 20 countries teamed up to take down a well-known cybercrime forum and dozens of its members.
Cops gave a malware-laden drive to a lawyer for whistleblowers
Arkansas' Fort Smith Police Department may be responsible for some particularly sinister digital t...
Sophisticated malware has been spying on computers since 2008 (updated)
Highly sophisticated malware isn't limited to relatively high-profile sabotage code like Stuxnet -...
New spyware targets Hong Kong protesters' phones
Hong Kong's pro-democracy protesters have more to worry about than they thought -- someone is gunn...