Don't-Miss Security Stories
IBM may be the fastest-growing vendor in the worldwide security software market, but it's also the owner of the world's largest source of spam.
A recently detected distributed denial-of-service (DDoS) attack was launched from 900 compromised CCTV cameras that were hijacked by hackers.
Researchers from Boston University said on Wednesday they've found several flaws in NTP that could undermine encrypted communications and even jam up bitcoin transactions.
Microsoft has started a three-month bug bounty program for two tools that are part of Visual Studio 2015.
Synack, a security company uses crowdsourcing for penetration testing, has built an intelligence platform that it says will narrow down weak points in a company's network.
Mozilla is considering banning digital certificates signed with the SHA-1 algorithm in July 2016.
Oracle fixed a vulnerability in Java that a Russian cyberespionage group used to launch stealthy exploits against NATO member countries earlier this year.
Google and Yahoo are expanding their use of a successful system used to detect spam.
The hardware-based encryption built into popular Western Digital external hard disk drives has flaws that could allow attackers to recover data without knowing the user password.
Magento said Tuesday there does not appear to be a new vulnerability in its e-commerce platform that is causing some websites to become infected with the Neutrino exploit kit.
Google will require Android devices capable of decent cryptographic performance to enable full-disk encryption by default in order to be declared compatible with Android 6.0.
Ireland's Data Protection Commissioner has agreed to investigate a complaint alleging that Facebook gave U.S. intelligence agencies bulk access to its users' personal data.
Cyber insurance premiums could prove a big driver of Internet of Things standards as insurers look for strong, widely used tools to protect against data breaches, IoT experts say.
In the 1960s and 70s, technically savvy enthusiasts sought to game telecommunications systems to make free calls, keeping telecom engineers on their toes.
This malicious browser looks and acts just like Chrome--except for all the pop-up ads, system file hijacking, and activity monitoring.