More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.
If major companies can be breached, is there anything home users can do to escape the same fate? Plenty, say security experts.
We all have them, and now's the time to make them both hacker-proof and easier to manage.
You know those nagging Java update boxes that pop up in your desktop? They're actually kind of important.
Ransomware is on the rise. Your best protection? Something everyone knows they should do.
Smartwatches, smart homes, smart connected cars: All carry software vulnerabilities that could impact your privacy or safety. But you can be smart about knowing the risks before you buy.
In the wake of a breach, researchers typically focus on the poor password choices of users, but reuse is a much greater threat.
Companies that move to the cloud have a whole host of decisions, one of the first being whether to develop their own software on top of a cloud infrastructure or not.
Multiple security providers see more malicious activity, as botnet operators attempt to grow their networks of compromised computers.
The business that manages New York City's hospitals consolidates 11 data centers into two facilities, dispensing with two-thirds of their physical servers for a predicted savings of $70 million over 5 years. Consider these four tips.
As attacks on the security infrastructure increase, we must ask if the firms responsible for our safety can protect themselves, much less us
The online giant kicks off an experimental program that allows security researchers to find bugs in its site
Articles by Robert LemosNext Page