Your hotel room can be hacked with a ‘dry erase marker’

Depending on what type of key system is used at the hotel you’re staying in, it might be possible for someone with a “dry erase marker” to bypass the door key system and walk right in.

Authentication takes center stage for mobile device security

Microsoft and Apple have both made recent acquisitions aimed at bolstering authentication technology and providing better security for mobile devices.

Staged cyber schemes may help shore up 'weakest link'

Mock phishing attacks might be the best way to teach users to avoid them in the real world.

Update your Samsung Galaxy S III now or you might lose all of your data

A simple 11-digit code can be used by attackers to remotely trigger a full factory reset on the Samsung Galaxy S III smartphone.

197 reasons you should upgrade to iOS 6 immediately

Forget about the 200 new features and updates Apple talks about, there are 197 flaws and vulnerabilities fixed in iOS 6.

Will you be more secure if you abandon Internet Explorer?

Switching browsers will protect you from the current Internet Explorer zero-day exploits, but it's not a silver bullet security solution.

Your PC may come with malware pre-installed

Microsoft researchers have discovered computer systems infected with botnet malware before they're even taken out of the box.

FBI rolling out high-tech 'Big Brother' monitoring system

The FBI's Next Generation Identification (NGI) system is raising concerns among some privacy advocates.

Android users are prime target for malware

A new report finds malware threats are at a four-year high, and mobile platforms in particular are a hot target--especially Android.

Do Authentication Questions Really Protect You?

Authentication questions are designed to prove you're really you, but with so much information shared online they can be trivial for attackers to bypass.

Protect Your Dropbox Data with Two-Factor Authentication

Dropbox is stepping up security for its cloud-based data storage service by providing the option of requiring two-factor authentication to log in.

What You Should Know About the iPhone SMS Spoof Attack

A flaw in iPhone security could allow spoofed SMS text messages, but there are some tricks you can use to detect and avoid them.

A Sinister New Breed of Malware is Growing

New threats like Shamoon, Flame, and Stuxnet represent a concerning evolution for malware attacks.

Users Are Still the Weakest Link

Most security experts agree that there is no security in the world that can guard against human error.

on techhive.com

Encryption Is Not a Silver Bullet

Encryption is a crucial part of computer and data security, but don't ever make the mistake of believing any encryption is "unbreakable".