Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.
Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.
Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.
Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.
Any electronic communication, no matter how private, could eventually be made public.
More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.
Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.
Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.
Cybercriminals are taking advantage of the holiday shopping frenzy to trick you into clicking a link you'll regret later.
Ironically, a safer kind of credit card could spur a last-ditch wave of exploits for older cards. And who's watching your electronic medical records?
Regin's a puzzle, with a long career that apparently has yet to affect the U.S. If that should happen, however, the classic protective measures will be your best defense.
The data breaches of 2014 have put all IT professionals on alert, but it's hard to tell whether they're as prepared as they think they are. Putting your own defenses in place is your best insurance.
DarkHotel's strategy is primitive but powerful, seeking out highly placed corporate users via vulnerable public networks. But there is a way to stay safe.
A survey by Intel Security shows great expectations for future IoT devices, but the things we’ll need to protect will become increasingly personal.
CurrentC wants to go head-to-head with Apple to become the mobile payment system of choice, but it's suffered a data breach of customer data before it’s even launched.
Articles by Tony BradleyNext Page