This time, it's not payment card data but personal information on merchant applications.
Virtualization is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world.
The unusual security stuff for sale at the recent GovSec Conference in Washington, D.C.
Despite calls for more information about how Apple stores and analyzes the voice data it may be collecting through its Siri feature, Apple hasn't offered much explanation.
VMware today said its virtual-machine infrastructure software, vSphere 5.0, has achieved certification under what's known as the Common Criteria program.
Office 365 is the Microsoft Office suite of desktop applications and hosted versions of Microsoft's server products delivered and accessed over the Internet.
Brigham & Women's Hospital in Boston advises new doctor to not 'friend' patients on Facebook.
A survey of more than 4,000 mobile-device users and IT professionals shows wildly abundant use of mobile devices.
ICS-CERT takes unusual step of issuing public warning to raise awareness.
The goal is to give IT managers a way to perform a wide variety of security checks on both the servers, usually virtualized, and the data they use in public and hybrid clouds.
Hackers are always hunting to find business-logic flaws, especially on the Web.
More of those problems are originating from laptops and mobile devices rather than a human slip-up in handling paper documents.
Cyberattacks are starting to eclipse terrorism as a threat to the country, say top officials from the Federal Bureau of Investigation.
The fake "Roar of the Pharaoh" Android game app is actually the latest Trojan Scam, security researchers warn.
An annual review of global security threats identifies the U.S. and Canada as the primary source of malware attack focus.