Don't-Miss Security Stories
One-time passcodes, a crucial defense for online banking applications, are being intercepted by a malware program for Android, according to new research from Symantec.
It just takes one lost laptop to ruin a company's security. Some firms have solid plans for managing the risk. Does yours?
Cisco Systems built a security system for the Chinese government knowing it would be used to track and persecute members of the Falun Gong religious group, according to the Electronic Frontier Foundation technology rights group.
A cyberespionage group was found using a new remote access Trojan dubbed Trochilus whose detection rate was very low among antivirus products.
The DD4BC gang has demanded bitcoin in return for not divulging information or disrupting online services.
Mozilla's login system Persona will be shut down on Nov. 30 as its usage is low and has not grown over the last two years.
A discovery by a well-known Google security researcher provides further proof how antivirus programs designed to shield computers from attacks can sometimes provide a doorway for hackers.
To make timekeeping more reliable, Microsemi is releasing two appliances it says are hardened against attacks and have better redundancy if other services such as GPS aren't working.
Developers of the popular Drupal content management system are working to secure the software's update mechanism after a researcher found weaknesses in it.
A new study of a cyberattack last month against Ukrainian power companies suggests malware didn't directly cause the outages that affected at least 80,000 customers.
A team of senior White House officials plans to meet with Silicon Valley tech leaders on Friday to discuss ways the two can work together in combating radicalization and extremism.
The White House hopes a Friday summit between senior government officials and Silicon Valley tech leaders will find common ground on ways the two can work together to combat extremism and radicalization.
Unlike Mozilla, Google plans to ban only SHA-1 certificates that were issued after Jan. 1 by public certificate authorities, not self-generated ones too.
The 'Brain Trust' malware family not only gains root access to your device, but can assign five-star reviews to its infected apps.
Cyberespionage groups could easily exploit vulnerabilities in antivirus programs to break into corporate networks, according to vulnerability researchers who have analyzed such products in recent years.
It's no secret that the U.S. government wants the tech industry's help in waging its war on terror. What has been a secret, up till now, is the exact agenda of a meeting between technology executives and government officials, to be held in Silicon Valley on Friday.