The Tor Project banned 380 vulnerable entry and exit relays and is eyeing 1,000 more.
A password management service discovers that the Heartbleed bug can be used to target individual users.
Researchers used a specially-crafted virus called ‘Chameleon’ to attack access points, which could then spread the malware along wirelessly.
What's in a name? For one security expert, not enough when the name is "malware."
Security is inconvenient by nature. The trick is finding a balance that provides adequate security with an acceptable level of convenience at the same time.
Attackers changed the DNS configuration of vulnerable home routers to mount man-in-the-middle attacks against users in Poland.
Congress should reform the NSA in an attempt to restore trust in the US tech industry, the ITI says.
Common router features may be putting your data at risk. Follow this guide to close the security holes.
Fortinet appliance promises to eliminate security bottlenecks with 160 Gbps throughput.
Recent threats like Stuxnet, Duqu, and Flame managed to spread undetected for years. You need to take steps to protect your PC against threats that may already be out there circulating on the Internet.