Don't-Miss Business security Stories
The development team behind the popular Nginx open-source Web server software released security updates on Tuesday to address a highly critical vulnerability that could be exploited by remote attackers to execute arbitrary code on susceptible servers.
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why.
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and Bitdefender.
Researchers propose foiling password thieves by salting password databases with red herrings called 'honeywords.'
China's government and military appear to be directly involved in cyberattacks against the U.S., according to a report released Monday by the U.S. Department of Defense.
Aging networking protocols still employed by nearly every Internet-connected device are being abused by hackers to conduct distributed denial-of-service attacks.
Changing your LivingSocial password is a good first step, but the attackers already have crucial information you can’t change or undo.
Adobe Systems has appointed Brad Arkin, the company's senior director of security for products and services, to become its first CSO. With a mature product security program already in place, the top priorities for Adobe's new security chief are to strengthen the security of the company's hosted services and its internal infrastructure.
Samsung's Knox software is expected to give the company's Galaxy phones a seriously business-friendly boost, but it may be facing delays.
SecurEnvoy has upgraded its SMS-based system for two-factor authentication with the ability for users to receive one-time passwords via a landline telephone call and enter them using the telephone keys.
Living in a connected, online world is encroaching on our privacy, but if you use the security tools available you can maintain some sense of control.
As Twitter gets ready to roll out two-factor authentication into its service, here's a rundown of how other major online services use the security feature.
Java vulnerability hunters from Polish security research firm Security Explorations claim to have found a new vulnerability that affects the latest desktop and server versions of the Java Runtime Environment (JRE).
Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report released Tuesday by Verizon.
CA Technologies is acquiring Layer 7 Technologies, a purveyor of tools for managing and securing application programming interfaces (APIs).