Google doubles the number of vulnerabilities it has fixed in new browser release.
When it comes to cloud security, control is the key, says the CEO of CloudPassage.
Researchers from Georgia Institute of Technology disclose potential new vulnerability in Apple devices.
Three flaws were patched on Windows over a month ago.
Co-founder of cloud security content delivery network explains what makes his platform work.
As threats and breaches continues to grow, there is a need for a new type of certified professional.
Browser vendor is breached, but is it an SSL issue?
Android malware now represents 92% of the mobile malware landscape. Why is that? and what can YOU do to stay safe?
Crowdstrike launches active defense platform.
The top bounty in the new program is worth $100,000.
Once again, a slew of patches for Java which raises the question, can Java ever be secured?
Top Linux security engineers address whether complete security can ever be achieved with the open source operating system.
What's new and what's coming that will secure the open source browser
New login verification feature debuts but experts debate on whether it will actually make a real difference or not.
New flaw is identified as being the root cause of attack against the U.S. Government Department of Labor
Verizon Data Breach Investigations Report identifies financially motivated cybercrime as being the top breach of 2012, but don't underestimate China.
A common DNS misconfiguration was at the core of last week's massive DDoS. Now the U.S. government is providing guidance on how to fix the problem.
What's wrong and what's right with SSL? Nearly two decades after he helped write SSL 3.0, Paul Kocher is looking to hardware for security.
Security researchers from Trustwave take aim at Platform-as-a-Service and find security controls to be lacking
Tom Ridge tells the government to stop talking and start acting.
Top hackers debate mobile security at the RSA 2013 security conference.
The five flaws that remained unpatched until today included the vulnerability behind the "Lucky Thirteen" SSL cryptographic timing attack.
Oracle issues massive update to secure Java.
Two releases in one week for Mozilla as the open source browser vendor rapidly responds to potential security risk.
At the SecTor security conference, the head of Security Engineering for Check Point explains how modern IT risks such as APTs and BYOD relate to the mythology of Star Wars.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?