Almost 2 million users of social networks should be changing their passwords, as stolen login credentials were found on a botnet server.
Stuxnet creators knew they had built the world's first true cyber-weapon, and were more interested in exploring its capabilities than any specific target, a study suggests.
Google's faster-than-expected upgrade of all its SSL certificates to an RSA key length of 2048 bits will make cracking connections to the company's services more difficult without affecting performance, experts say.
Companies battling tireless cyberespionage campaigns may be up against well-organized attackers that are fed a steady stream of malware from a talented developer of cyber-arms.
Mobile botnets are on the rise and cybercriminals are using the Google Cloud Messaging service to distribute malware, a new report says.
Spear phishing is one of the most effective ways to break into a corporate network, and recent studies show that employees can be easily tricked on social media.
The number of brands used in spoofed emails that trick people into visiting malicious Web sites or clicking on malware attachments rose in the second quarter.
Google Chrome saves some personal data in a way that could be exploited by malware, security experts say.
Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say.
Without exception, using a credit or debit card was deemed more secure than a mobile phone, whether the purchase was made in-store or online, according to a survey sponsored by the National Cyber Security Alliance and PayPal. In addition, the personal computer was seen as the safest option for accessing the Web by 62 percent of the respondents versus six percent who chose a smartphone.
While some experts welcome the opportunity to share security procedures with government agencies, another considers it a Trojan horse for more access to Americans' communications.
Infrastructure and tools used by hackers originate from network infrastructure in China, security firm Symantec says
ICANN's plan to close access to the WHOIS domain name record system is criticized as a move to put too much power into one group's hands
Apple is providing MDM APIs that better allow vendors to 'take advantage of the operating system hooks to provide application-level security'
Social media law evolves with a recent federal court ruling that recognizes some Facebook data can stay private under the Stored Communications Act.
Articles by Antone GonsalvesNext Page