A federal initiative called the "National Strategy for Trusted Identities in Cyberspace" has been encouraging the high-tech industry to work with government to find alternatives to simple passwords in order to foster more secure online transactions. The NSTIC program has been promising to fund $10 million in government grants for pilot projects to showcase innovative approaches, and today the winners were finally announced.
Coordinated under an effort called "Innovation Nation," the high-tech industry's trade associations, along with companies such as Microsoft and Facebook, organized a reception for the House Republican Whip team.
An attached file is loaded up with malware to take over the victim's computer should he or she open it.
Security experts are making the strong argument to turn off mobile devices' GPS functions unless really needed.
Ericom's gateway provides managed HTML5 streaming to devices.
As much as 90% of the top 100 paid Android and iOS apps are ending up criminalized in hackers' hands, an Arxan study claims.
The malicious code -- also called Disttrack -- may be part of a directed attack at energy companies, but could take down other systems in its wake.
Symantec today said it has plugged a hole in its Norton Online Backup service that inadvertently allowed some users to view and access data of other Norton Online backup customers.
NIST's updated Transport Layer Security standard requires number of security changes.
In exchange for information about sensitive information, such as identifying network vulnerabilities or attacks, the government will share this benchmarking data that's given to it anonymously with any other utility that participates in the information-sharing.
With business accelerating, it's about handling the bumps in the road.
A presentation at the Black Hat security conference featured an in-depth view into the security architecture for iOS, the basis of iPhones and iPad tablets.
A panel of experts here at the Black Hat Conference ask: Which do you trust less with your data, the U.S. Government or Google?
RSA Wednesday introduced a service at the Black Hat Conference to monitor far and wide for signs of phony corporate mobile apps, and to work with Google Play, Apple iTunes and other major app stores to remove them quickly.
Google Play's security filter called Bounce can be circumvented allowing malicious Android apps to be listed in library.