Spear phishing is one of the most effective ways to break into a corporate network, and recent studies show that employees can be easily tricked on social media.
The number of brands used in spoofed emails that trick people into visiting malicious Web sites or clicking on malware attachments rose in the second quarter.
Google Chrome saves some personal data in a way that could be exploited by malware, security experts say.
Sophisticated attackers could soon adopt an innovative technique for bypassing one of the most effective mechanisms for preventing a Windows security breach, researchers say.
Without exception, using a credit or debit card was deemed more secure than a mobile phone, whether the purchase was made in-store or online, according to a survey sponsored by the National Cyber Security Alliance and PayPal. In addition, the personal computer was seen as the safest option for accessing the Web by 62 percent of the respondents versus six percent who chose a smartphone.
While some experts welcome the opportunity to share security procedures with government agencies, another considers it a Trojan horse for more access to Americans' communications.
Infrastructure and tools used by hackers originate from network infrastructure in China, security firm Symantec says
ICANN's plan to close access to the WHOIS domain name record system is criticized as a move to put too much power into one group's hands
Apple is providing MDM APIs that better allow vendors to 'take advantage of the operating system hooks to provide application-level security'
Social media law evolves with a recent federal court ruling that recognizes some Facebook data can stay private under the Stored Communications Act.
In releasing its first report on government requests for user information, Facebook is reminding consumers and businesses that using the Internet today requires self-censorship.
With more smartphones shipping than PCs, mobile ad networks open up the perfect backdoor for downloading code
Windows, with its greater levels of adoption, has long been the preferred target of hackers; for the mobile world, that dubious title clearly now goes to Android, security researchers say.
In addition to lax passwords, manufacturer lacks a effective way to get its patches and updates out to customers.
Like Google and Facebook, Twitter is experimenting with multi-factor authentication