Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
When the New York Times' website dropped off the Internet in August, it's a good bet that its system administrators were tearing their hair out trying to figure out how their servers had been hacked.
But … more »
Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.
Akamai is paying $370 million to add a missing piece to its security portfolio, enabling full Web application and data center Distributed Denial of Service protection.
Biometrics promised to bring security to everything from transactions to systems usage. Yet biometrics never saw broad adoption. Can biometrics finally go mainstream?
The researcher once known as Rain Forrest Puppy explains how he discovered the first SQL injection more than 15 years ago.
New research considers security implications of mobile point-of-sale applications on Apple's iPhones and iPads.
As an annual contest shows, social engineering can be an effective way for hackers to obtain sensitive data. Training is one of the best ways to fight social engineering.
There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.