Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.
Any electronic communication, no matter how private, could eventually be made public.
More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.
Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.
Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.
Cybercriminals are taking advantage of the holiday shopping frenzy to trick you into clicking a link you'll regret later.
Ironically, a safer kind of credit card could spur a last-ditch wave of exploits for older cards. And who's watching your electronic medical records?
Regin's a puzzle, with a long career that apparently has yet to affect the U.S. If that should happen, however, the classic protective measures will be your best defense.
The data breaches of 2014 have put all IT professionals on alert, but it's hard to tell whether they're as prepared as they think they are. Putting your own defenses in place is your best insurance.
DarkHotel's strategy is primitive but powerful, seeking out highly placed corporate users via vulnerable public networks. But there is a way to stay safe.
A survey by Intel Security shows great expectations for future IoT devices, but the things we’ll need to protect will become increasingly personal.
CurrentC wants to go head-to-head with Apple to become the mobile payment system of choice, but it's suffered a data breach of customer data before it’s even launched.
Windows automatic updates don’t work if you never restart the PC, and yet that seems to be the bottleneck for many, according to a survey of 4,500 Windows users
Microsoft issued a security advisory for the vulnerability, which resembles a flaw exploited in the Sandworm cyber espionage attacks.
Thanks to the FIDO Alliance's U2F open standard, a key drive or other small device could become a convenient, yet safe, authentication tool. The standard is backed by Google, Microsoft, Mastercard, Visa, PayPal and others,