Some security criticize the tactic of modifying a person's computer without permission, even if the intention is good.
Bitcoin sales all recorded to a public ledger, which means that Bitcoin payments made to a company could permit tracking of later payments made to that address.
Already, an illegal drug site accepts Bitcoins, but experts say it is unlikely to fill the void for cyberiminals left by Liberty Reserve
Oracle, which acquired Java with the purchase of Sun Microsystems in 2010, has been criticized for moving too slowly to stop Java exploits.
For celebrities and the average Joe, having two-factor authentication turned on won't protect them against determined hackers, however
Some of the technology has to be deployed together for maximum security, making the process complicated, said one security expert
Because of the hardware limitations, jailbreaking the device did not add much more risk than a rooted smartphone, one security expert said
Making app updates available only via the store will improve security on Google's mobile platform, but experts are not sure how much
Despite the exposure of the cyberespionage, Operation Beebus is still active, although its infrastructure has changed
With the next wave in consumer electronics expected to be wearable gadgets, researchers are evaluating the use of thought-based authentication with the technology.
Microsoft is reporting discovery of a sneaky new Trojan program is designed to hide its tracks so that security researchers can't analyze its methods.
Opponents of warrantless email gathering include Internet companies such as Google, Microsoft, Yahoo and Facebook -- and some lawmakers.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser.
For privacy advocates, bill a 'foundational step,' but the Chamber of Commerce says proposed law goes too far.
Symantec believes the people behind both attacks were just doing their job because of the backdoor file's directory path leading to where the code was compiled on disk in the creator's computer.