Researchers from Arbor Networks and IntelCrawler identify new attacks using malware designed for point-of-sale systems read more »
Attackers could start to aggressively distribute this malware in the near future, Kaspersky Lab researchers warn read more »
Leaked top secret presentation slide shows over 50,000 Computer Network Exploitation implants read more »
Small-timer added to 'most wanted' list read more »
The malware checks if infected systems have a SAP client application installed, ERPScan researchers said read more »
Spyware Blogsmore blogs ..
Watch this on demand webinar which explores IT innovation, managed print services and business agility.
Check out our latest articles on Microsoft's next-generation operating system.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.
Spyware In Depth
If you travel to China or Russia, assume government or industry spooks will steal your data and install spyware. Here's how to thwart them read more »
Juniper study finds nearly a third of IT managers have reported a security threat as a result of personal devices accessing company data read more »
Vendors have created a whole range of MDM tools and technologies to help IT professionals to stay on top in the Bring Your Own Device environment read more »
How secure are you? Check out our checklist featuring common aspects of computer security read more »
Cybercriminals are becoming more sneaky, but it's possible to deflect attacks with these best practices read more »
Symantec has backed off its earlier claims that apps in the Android Market were malware, but still says the apps are adware or spyware read more »more in depth ..