From app data separation and security enhancements to native QuickOffice editing within apps
The new feature will allow a phone to determine a safe environment in which it may allow access without a PIN.
This is what hack attacks look like: A real-time map of worldwide activity drives home the scope of security threats far more vividly than mere words ever could.
The U.S. has the most command-and-control servers for a product made by Italy's Hacking Team
Rootkits are again on the rise with the number of new samples reaching levels not seen since 2011, a McAfee report said
VPNs are great for privacy and jumping regional restrictions, but not all VPNs are created equal. Knowing some of the key differences can save you time and hassle.
Merely knowing what pages a person views on a website can hint at their personal life
A large number of sites are still vulnerable to Heartbleed, but it's unlikely we'll see them get patched anytime soon.
But fear not: This fork isn't intended to replace OpenSSL.
The year's only halfway done, but hackers have already filled enough headlines to last a decade.