Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.
Google is no stranger to the world of security, though not all of its efforts are well known. The search giant revealed a formerly secret effort with the announcement this week of the Google Project Zero … more »
When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.
Use-after-free memory errors often crop up in software application code.
New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.
Train users to read and heed mobile application permissions, says McAfee Labs.
A layered approach to security is the key to fighting advanced persistent threats (APTs).
Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.