In this first of two parts, we look at what security professionals can learn from data breaches that occurred in November 2013.
Each month, eSecurity Planet looks back at data breaches we've covered over the past 30 days or so, providing an admittedly unscientific but potentially interesting overview of the current breach landscape.
To … more »
Microsoft and its partners in law enforcement aim to disrupt the ZeroAccess botnet, one of the most robust botnets in operation today.
The key to securing the Internet of Things could be in making sure that everything isn't actually connected to the Internet.
Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.
Biometrics promised to bring security to everything from transactions to systems usage. Yet biometrics never saw broad adoption. Can biometrics finally go mainstream?
The researcher once known as Rain Forrest Puppy explains how he discovered the first SQL injection more than 15 years ago.