Half of all Android phones still run Android 4.2 or older. If they also buy from third-party app stores, they could be vulnerable to a hijacking app. This scanner will tell you if your phone is at risk.
Attackers look for ways to exploit the high demand and popularity of the NCAA college basketball playoffs.
Oh Hillary: You really thought using your own phone and your personal email address while serving as Secretary of State would be OK?
A critical flaw in the WP-Slimstat plugin could allow attackers to completely hijack vulnerable Wordpress sites.
Your passwords are one kind of secret you probably need to keep, even from trusted loved ones. A new survey from Intel Security reveals people's habits and the risks they might be taking.
There is a rise in fraudulent tax returns being filed by hackers armed with personal information from data breaches.
There's help for the 80 million individuals who could be affected by the Anthem data breach. A few proactive steps can help you stay alert to any attempted crimes using your personal data.
Cyber criminals use a sensitive topic to lure concerned parents into clicking something they shouldn't.
Free Office Online is a great deal, but paying for an Office 365 subscription gives you some hard-to-beat perks. We’ll help you decide which way to go.
Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.
Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.
Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.
Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.
Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.
Any electronic communication, no matter how private, could eventually be made public.
Articles by Tony BradleyNext Page