Depending on what type of key system is used at the hotel you’re staying in, it might be possible for someone with a “dry erase marker” to bypass the door key system and walk right in.
Microsoft and Apple have both made recent acquisitions aimed at bolstering authentication technology and providing better security for mobile devices.
Mock phishing attacks might be the best way to teach users to avoid them in the real world.
A simple 11-digit code can be used by attackers to remotely trigger a full factory reset on the Samsung Galaxy S III smartphone.
Forget about the 200 new features and updates Apple talks about, there are 197 flaws and vulnerabilities fixed in iOS 6.
Switching browsers will protect you from the current Internet Explorer zero-day exploits, but it's not a silver bullet security solution.
Microsoft researchers have discovered computer systems infected with botnet malware before they're even taken out of the box.
The FBI's Next Generation Identification (NGI) system is raising concerns among some privacy advocates.
A new report finds malware threats are at a four-year high, and mobile platforms in particular are a hot target--especially Android.
Authentication questions are designed to prove you're really you, but with so much information shared online they can be trivial for attackers to bypass.
Dropbox is stepping up security for its cloud-based data storage service by providing the option of requiring two-factor authentication to log in.
A flaw in iPhone security could allow spoofed SMS text messages, but there are some tricks you can use to detect and avoid them.
New threats like Shamoon, Flame, and Stuxnet represent a concerning evolution for malware attacks.
Most security experts agree that there is no security in the world that can guard against human error.
Encryption is a crucial part of computer and data security, but don't ever make the mistake of believing any encryption is "unbreakable".
Articles by David JeffersNext Page