10 Trickiest Mobile Security Threats

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile threats are the most problematic for security pros?

Mobile communications are an increasingly integral part of their everyday lives for people at work and at play. But as mobile access has grown, so have mobile threats. Such threats are lucrative for hackers … more »

Manual Penetration Testing Still Crucial to Smart App Development

With automated security testing, you do not need manual penetration testing when developing apps, right? Wrong!

Google Chrome 42 Gets Galactic Security Update

No towel required for 45 security fixes in Google's Chrome 42 browser.

Tailoring Security Info for the C-Suite

SurfWatch Labs' SaaS platform makes security information intelligible to business execs.

Mach37 Accelerates Security Startups

'Cyber accelerator' offers $50,000 and lots of training to security startups.

Do Threat Exchanges Work?

Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?

Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.