The only effective defense is to 'build security in' from the ground up, critics say in response to DoD, DHS comments
Apache, Yahoo overriding tracking settings -- off by default -- in Microsoft's new Internet Explorer browser
Security vendors Sophos and Kaspersky Lab both warn of scam emails using the names of well-established companies to try to lure victims to malware sites. The scheme is obvious, or ought to be—the bad guys figure that if they use a trusted name, victims will trust the link.
Given statements from U.S. officials that the nation is facing a "digital Pearl Harbor," this sounds like the impossible dream come true -- the cyber version of a Star Wars force field.
Malware-embedded images are the greatest threat on all search engines
Barrett Brown threatens to 'shoot and kill' government agents, but former attorney says the threats aren't serious.
The loose-knit group claimed a few breaches that weren't its work, but don't discount the hacktivist group's skill and power, a security expert warns.
One thing's for sure, says expert: 'We have never seen a font installed by malware before.'
Detection tools released this week for the latest descendant of the Stuxnet malware will not be effective for long.
'Ethical' hackers at Black Hat conference question the need to do so.
Security experts warn that "active defense" or "strike-back" techniques could escalate the battle with hackers.
The Olympic Games may welcome the colors of the world, but an underground contest pits the white and black hats.
In addition to legal costs, the social networking site's brand could be hurt if the case is not settled quickly
Experts say the move is positive, but it's unclear if Apple has changed its often criticized stance on security.
Detection is key, but how you respond to APTs is equally important