Don't-Miss Security Stories
Bitly is working with Symantec to clean up malicious links, the result of API keys left visible on the Web
Flaws in the network access control product can give attackers access to administrative functions, Cisco said
Method can batch-search 16,000 characters per second, and could be used for DNA research.
Google expects Impermium to fit in with Google's own spam and abuse teams
The company hopes to tap the security research community to find potential problems
Third party Twitter apps must now converse with Twitter through the SSL protocol
It sounds like the plot of a summer blockbuster, but the New York Times reports that the National Security Agency can actively nab data and install malware on non-networked computers.
The phone is the creation of smartphone manufacturer Geeksphone and encrypted communications provider Silent Circle
The listing were modified to redirect to what appear to be affiliate marketing websites
The appeal suspends an order obliging Google to explain to users of its French homepage why it has been fined
Judge John D. Bates in a letter on behalf of the federal judiciary opposes some of the proposed reforms of surveillance programs
Members of a review panel say their recommendations would not hurt legitimate terrorism investigations.
Security analysts advise applying critical Oracle and Adobe patches before those from Microsoft.
Researchers from security firm Malwarebytes spotted a tech support scam targeting smartphone and tablet users, while the Federal Trade Commission is warning consumers about scams offering tech support refunds.
Those who stole the data appear to be keeping a low profile on underground forums