Botnet which uses Tor for masking
This novel approach brings all sorts of advantages for zombie PC herders, as G-Data explains.
This novel approach brings all sorts of advantages for zombie PC herders, as G-Data explains.
Microsoft's Windows 8 is vulnerable to attack by exploits that hackers have been aiming at PCs for several weeks, Adobe confirmed Friday.
Hackers took advantage of a security flaw to make it appear as if spam was being sent from users’ friends while other online malcontents fooled 90,000 users into installing a snoo…
Crisis is a computer Trojan program that targets Mac OS and Windows users. The malware was discovered by antivirus vendor Intego on July 24 and can record Skype conversations, cap…
McAfee is expanding its mobile security software for Android tablets and smartphones, as it sees an increase in threats targeting Android devices, the Intel subsidiary announced o…