Because of the hardware limitations, jailbreaking the device did not add much more risk than a rooted smartphone, one security expert said
Making app updates available only via the store will improve security on Google's mobile platform, but experts are not sure how much
Despite the exposure of the cyberespionage, Operation Beebus is still active, although its infrastructure has changed
With the next wave in consumer electronics expected to be wearable gadgets, researchers are evaluating the use of thought-based authentication with the technology.
Microsoft is reporting discovery of a sneaky new Trojan program is designed to hide its tracks so that security researchers can't analyze its methods.
Opponents of warrantless email gathering include Internet companies such as Google, Microsoft, Yahoo and Facebook -- and some lawmakers.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser.
For privacy advocates, bill a 'foundational step,' but the Chamber of Commerce says proposed law goes too far.
Symantec believes the people behind both attacks were just doing their job because of the backdoor file's directory path leading to where the code was compiled on disk in the creator's computer.
Obama signs law requiring NASA, Justice and Commerce departments get clearance from the FBI before buying IT systems from China-related firms
While two-factor authentication is not a silver bullet, it is a necessary step toward better security, said one analyst
This latest vulnerability report follows a week after the same company reported two other holes in Oracle's plug-in
Cyber Fighters have claimed responsibility for five waves of attacks against banks since last September
Third-party cloud provider hack behind compromised user data from Twitter, Tumblr and Pinterest