The new authentication option offers better security than static passwords, but it's not as strong as two-step verification
A hardware enthusiast created a USB thumb drive that can discharge a high voltage into a computer's USB interface
Ugh - the program encrypts game saves, mods, maps and other user-generated content for a large number of popular games.
The vulnerability in a plug-in from Yoast exposes sites to SQL injection attacks
The name matches an NSA project listed in a secret document leaked by Edward Snowden
A Microsoft patch for an exploit used by the Stuxnet worm was incomplete, researchers found
A secret CIA-sponsored conference reportedly hosted talks on stealing encryption keys from Apple devices and infecting them with malware
Documents leaked by Edward Snowden detail how the CIA repeatedly tried to crack the security in Mac OS X and iOS applications.
Attackers can force users to associate their accounts on other sites with malicious Facebook accounts.
Five additional Trojan programs are related to the Babar malware that Canada's government believes is the work of French intelligence
The intrusion resulted in the contact information of 800 DoD employees being stolen from a satellite communications system
A recently disclosed vulnerability in SSL/TLS implementations also affects Microsoft's Schannel crypto library and Internet Explorer
The company offers no bounties, just public kudos.
This allows man-in-the-middle attackers with access to revoked, but otherwise valid, certificates to manipulate encrypted traffic
The operation seized command-and-control servers and Internet domains used by the Ramnit gang