RSA researchers say new attack targets one bank with fake site that pops up a live chat window where victims are tricked into revealing personal information.
Researchers find clues as to how switching servers behind hard-coded domain names keeps criminals in business.
A researcher examines how the Storm worm botnet has remained resilient when others simply fail over time.
Venerable botnet encrypts its command codes using the current date.
Automated attack claims another high-profile target, offering sale of a fake antivirus scanner.
For the third month running, compromised computers in Europe have pushed out more spam than those in the U.S.
Hacking for fun has evolved into hacking for profit, and created a business model nearly as sophisticated as that of legal software.
Use of encryption key for peer-to-peer traffic, researcher says, could allow creation of smaller networks--and "a lot more of Storm."