Don't-Miss Business security Stories
Oracle fixed a number of critical security flaws in Java with the latest update, but it's still too slow to patch and attackers will continue to take advantage.
E-commerce and security experts share 15 tips on how you can prevent fraud and keep your site safe.
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
In the aftermath of the revelation of Prism, the NSA's data collection program, the virtual currency Bitcoin has been pegged as a more private option; but the virtual currency may not be secure from government surveillance, either.
Encrypting data may not guard against surveillance, some experts say, while others argue in favor of taking steps to protect privacy.
Data encryption could help businesses protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.
Security experts share their insight and opinion on the June Patch Tuesday security bulletins from Microsoft.
For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).
With smartphone theft exploding, businesses face extreme risks
A new survey from Tripwire explores whether risk management is more science, or art.
Android smartphones and tablets are under attack, and the most popular tools developed to protect them are easily circumvented, according to new research from Northwestern University and the University of North Carolina.
There are only five security bulletins scheduled for next week, but one is a Critical update for Internet Explorer.
A hacker released what he claims is a zero-day exploit for older versions of the Parallels Plesk Panel, a popular web-hosting administration software package, that could allow attackers to inject arbitrary PHP code and execute rogue commands on Web servers.
Hackers would face a minimum two-year prison sentence under a new European Union law approved by the European Parliament’s civil liberties committee on Thursday.