Targeting your users for phishing attacks is a great way to ensure social engineering training sticks.
A stolen password was used to access the employee's account, which contained a document with user e-mail addresses, Dropbox said.
The infamous security convention has wound up, leaving hackers of all hat colors bemused, befuddled, and bewildered.
New Rakshasa hardware backdoor is demonstrated at Defcon security event; it is persistent and hard to detect, researcher says.
Security researchers released two tools at the Defcon security conference that can beat the encryption of certain PPTP sessions in less than a day's work.
Hotel locks, iris scans, GooglePlay and other "secure" technologies are cracked in demonstrations at the security conference.
We need stronger security for mobile devices as we begin to make payments by smartphone, or connect on the go to the company network.
Black Hat security conference: University of Washington creation gives you vicarious thrills of social engineering, lock picking.
A tool for testing if Web application firewalls (WAFs) are vulnerable to around 150 protocol-level evasion techniques was released at the Black Hat event.
Microsoft is launching a new version of the Enhanced Mitigation Experience Toolkit (EMET), which includes new techniques contribute by a BlueHat Prize finalist.