Don't-Miss Security Stories
The flawed security technique used by Superfish has been found in other software, which has begun a chain reaction of security vulnerabilities.
Google will also be subject to quarterly checks in Italy
The surveillance agencies reportedly were able to monitor a large portion of the world's mobile traffic
Phase two of the project will begin shortly and will be done by a professional team of consultants
The malware works in the background after pretending to shut down a phone, AVG said.
Spy agencies may have your phone's encryption keys ... Re-engineering 4G for IoT... Hackers are still lurking in U.S. State Dept. network
The Google Cloud Security Scanner can ferret out XSS and mixed-use vulnerabilities
If you've bought a Lenovo laptop in recent months it may have come packed with adware called Superfish that also creates massive security holes in your PC.
Samsung buys LoopPay ... Qualcomm getting set to roll out 64-bit mobile chips ... Ex-GM CEO warns Apple off the car business
The changed rule would extend the authority of federal judges to issue warrants for searching computers
Blackshades was widely used in the cybercriminal underground for about three years
The company's new data exchange is catching on, but its prospects for sharing with the goverment are less clear
The secure device maker is also holding a press conference at the show where the tablet could be announced.