Soon it will be practicable to take someone's photo on a smartphone and within minutes know their Social Security number and a range of other private data.
Some of the security experts gathering for conferences next week will test their break-in skills on their attendees.
Law enforcement may be interested to see if anyone actually shows up to this year to accept the annual Pwnie Award for Epic Ownage at Black Hat, since all the nominees face possible criminal charges.
Avaya is betting businesses want to respond as quickly as possible to attacks and criticisms launched from Twitter, Facebook and blogs.
The new Anonymous hacking school expects to release its first grads within a month, so watch for an effect on cybercrime.
With Cisco finally saying it will charge $750 for its Cius tablet, there's a lot of comparisons being made between it and the iPad.
Bragging rights, not profits again motivate "hactivist groups," exec suggests.
The hacker group says the British teen arrested in connection with its attack on a police agency's website was not an active member of the group.
The National Cyber Range will reportedly help military planners try out attack and defense scenarios.
A phony anti-virus scam is presenting itself as a near-perfect Microsoft update popup with one notable exception - it appears only on machines using Firefox.
Virtualization, mobility and social networking were flagged as posing most security risk to businesses, partly because there is no accepted set of best practices yet to protect them, IT Roadmap attendees were told.
Should cyber-strike provoke a physical response used in traditional warfare?
IPhones, iPads and other employee-owned mobile gear are the most risky devices that can be connected to corporate networks, according to a new survey by ISACA.
Public clouds have a way to go if they want to be the top choice of businesses looking to put resources in a shared, centralized computing environment.