The Cisco AnyConnect Secure Mobility Client was updated to fix vulnerabilities that could allow attackers to gain system or root privileges on Windows, Linux and Mac OS X computers.
AMD is back and this time it's mostly ready for the Battlefront beta next week, after the company's initial Battlefront-focused beta driver had a major memory leak issue.
Little more than a year after it was first introduced, Sprint is increasing the price of its $60 unlimited talk, text, and data plan.
Newly discovered vulnerabilities in the way Android processes MP3 and MP4 files can allow attackers to compromise devices by tricking users to visit specifically-crafted Web pages. Meet Stagefright 2.0.
Pixel C vs. Surface 3: fight!
New versions of the Dyreza computer Trojan are configured to steal credentials for order fulfillment, warehousing, inventory management, ecommerce and other IT and supply chain services.
Where Office 2013 made file-sharing complex, Office 2016 makes it easy as pie.
Thanks for confirming the Lumia 950 and 950XL before the official launch, Microsoft!
The security response team from Akamai Technologies have observed multiple attacks originating from a Linux botnet recently that have ranged from a few gigabits per second to over 150.
Android 6.0 is headed to Nexus devices the week of Oct. 5.
Windows 10 automatically puts new Mail notifications in the Action Center, but doesn't tell you about it. Here's how to fix that.
James Forshaw, a member of Google's Project Zero team, has recently discovered two serious vulnerabilities in the driver that the TrueCrypt full disk encryption program installs on Windows systems.
Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices.
The Blackphone 2 is designed to meet the management and security needs of enterprises, while not alienating workers who will end up using it for their personal affairs as well.
Man-in-the-middle attackers can inject cookies over HTTP connections in order to extract information from encrypted HTTPS traffic.
Articles by IanNext Page