Cylance Chief Product Officer Rahul Kashyap talks to International Business Times about the role of AI in cybersecurity.
WikiLeaks released a new batch of files from the CIA that claims to document Angelfire, a framework used to maintain a backdoor on infected Windows machines.
By exploiting a vulnerability in a popular point-of-sales server system, hackers are able to steal credit card credentials and change prices on any item.
The FBI arrested a Chinese national who is accused of distributing malware used in the OPM hack.
Attackers have taken to using misspelled versions of familiar brands to trick users into giving up their credentials and other information on Facebook.
More than 500 apps that have amassed a total of more than 100 million downloads have been removed from the Google Play Store for being vulnerable to a spyware exploit.
The U.S. Defense Intelligence Agency is planning to retaliate against attackers by re-engineering malware and sending it back at malicious actors.
A new Android adware called GhostClicker has been discovered in at least 340 apps available through the Google Play Store.
Spammers are parking on domains similar to popular banks and spreading malware to visitors.
Marcus Hutchins, the security researcher who stopped the spread of the WannaCry ransomware attack, plead not guilty to charges of hacking and wiretapping.
A majority of information security experts surveyed said most enterprise organizations have failed to take steps to secure their systems against future malware attacks.
Fancy Bear, which is believed to be the group who hacked the Democratic National Committee, has been targeting hotel guests.
A Ukrainian citizen was arrested for his or her role in helping spread the malware that was used in the global Petya cyberattack.
A new mutation of an old MacOS adware attack is hijacking Macs and installing malicious programs to generate a profit for the attackers.
Two major malware campaigns targeting North Korea were launched following the country's test of intercontinental ballistic missiles.
A new Android malware attack known as Invisible Man poses as a Flash update to install on a victim's device, then steals personal and financial information.
A new bipartisan Senate bill proposes changes to the security standards required for internet-connected devices sold to and used by the federal government. Does the legislation go far enough?
Amazon Echo devices are vulnerable to a physical attack in which a hacker installs malware on the device to record all conversations.
A new report from Mimecast found popular email services including those from Google and Microsoft fail to catch some malicious messages.
Google's security researchers discovered and blocked a new family of malware that could spy on just about every aspect of a user's Android device.
With the rise of ransomware on the internet, it barely comes as a surprise that hackers and cyber criminals are now operating like legit firms.
The company has been testing its free antivirus in select regions for one and a half years.