One or more antivirus vendors flagged 22 percent of 8000 popular apps as having issues
Critics are urging the end of passwords, but skeptics say the alternatives not yet ready for prime time.
One analyst compared security spending to preparing for a natural disaster -- wait until it happens and it's 'too late'
Subscribing to a virtual private network managed by a company in another country can make it more difficult for the NSA and other U.S. agencies to snoop on U.S. citizens.
The attackers did not exploit any vulnerabilities, but they opened up accounts and used the services as their infrastructure
Recurring lock-screen problem demonstrates the need for additional layers of security on mobile devices, says analyst
Researchers at Security Labs of Kindsight have developed a proof-of-concept program that can launch a spy program inside any Android app and monitor the user's actions through the phone.
Since it's clear that security breaches happen even when sites are careful, users might be wise to guard their data themselves.
Stanford University has launched an online privacy initiative meant to complement Do Not Track, an effort aimed at preventing sites from recording people's Web browsing without permission.
Lobbyists for more consumer protection against electronic surveillance hope the state's approach will be echoed by Congress.
Some security criticize the tactic of modifying a person's computer without permission, even if the intention is good.
Bitcoin sales all recorded to a public ledger, which means that Bitcoin payments made to a company could permit tracking of later payments made to that address.
Already, an illegal drug site accepts Bitcoins, but experts say it is unlikely to fill the void for cyberiminals left by Liberty Reserve
Oracle, which acquired Java with the purchase of Sun Microsystems in 2010, has been criticized for moving too slowly to stop Java exploits.