For celebrities and the average Joe, having two-factor authentication turned on won't protect them against determined hackers, however
Some of the technology has to be deployed together for maximum security, making the process complicated, said one security expert
Because of the hardware limitations, jailbreaking the device did not add much more risk than a rooted smartphone, one security expert said
Making app updates available only via the store will improve security on Google's mobile platform, but experts are not sure how much
Despite the exposure of the cyberespionage, Operation Beebus is still active, although its infrastructure has changed
With the next wave in consumer electronics expected to be wearable gadgets, researchers are evaluating the use of thought-based authentication with the technology.
Microsoft is reporting discovery of a sneaky new Trojan program is designed to hide its tracks so that security researchers can't analyze its methods.
Opponents of warrantless email gathering include Internet companies such as Google, Microsoft, Yahoo and Facebook -- and some lawmakers.
Social network's new overlay for Android smartphones 'would be the first thing I would block on my network,' said one security adviser.
For privacy advocates, bill a 'foundational step,' but the Chamber of Commerce says proposed law goes too far.
Symantec believes the people behind both attacks were just doing their job because of the backdoor file's directory path leading to where the code was compiled on disk in the creator's computer.
Obama signs law requiring NASA, Justice and Commerce departments get clearance from the FBI before buying IT systems from China-related firms
While two-factor authentication is not a silver bullet, it is a necessary step toward better security, said one analyst
This latest vulnerability report follows a week after the same company reported two other holes in Oracle's plug-in