Trustwave researcher warns about the risk of touchlogger applications on IOS and Android
For years, security researchers have warned about the risks of keylogging software on computing platforms. Keyloggers, quite literally log and record the keystrokes taken by a user in a bid to learn passwords … more »
Researchers reveal how they can leverage free cloud services as an efficient attack platform without spending any money.
Head of National Cybersecurity Protection System explains where DHS is making investments to defend the U.S federal government's network.
What has changed in the year since Kevin Mandia first exposed hacking by the Chinese Army?
Here are three do's and two don'ts for responding to a data breach.
Privacy officers from Google, Microsoft and Intel Secret discuss privacy in the modern world at this week's RSA conference.
Addressing RSA attendees, IDC analysts detail outlook for the current and future IT security landscape.
VMware aims to position the hypervisor as the 'just right' place to do security.
Modern Web and mobile apps tend to use external resources, often called via an API, making the API a critical control point for security. That is why CA is addressing API security with new products.