Once again, a slew of patches for Java which raises the question, can Java ever be secured?
Top Linux security engineers address whether complete security can ever be achieved with the open source operating system.
What's new and what's coming that will secure the open source browser
New login verification feature debuts but experts debate on whether it will actually make a real difference or not.
New flaw is identified as being the root cause of attack against the U.S. Government Department of Labor
Verizon Data Breach Investigations Report identifies financially motivated cybercrime as being the top breach of 2012, but don't underestimate China.
A common DNS misconfiguration was at the core of last week's massive DDoS. Now the U.S. government is providing guidance on how to fix the problem.
What's wrong and what's right with SSL? Nearly two decades after he helped write SSL 3.0, Paul Kocher is looking to hardware for security.
Security researchers from Trustwave take aim at Platform-as-a-Service and find security controls to be lacking
Tom Ridge tells the government to stop talking and start acting.
Top hackers debate mobile security at the RSA 2013 security conference.
The five flaws that remained unpatched until today included the vulnerability behind the "Lucky Thirteen" SSL cryptographic timing attack.
Oracle issues massive update to secure Java.
Two releases in one week for Mozilla as the open source browser vendor rapidly responds to potential security risk.
At the SecTor security conference, the head of Security Engineering for Check Point explains how modern IT risks such as APTs and BYOD relate to the mythology of Star Wars.
Phishme raises millions in an effort to phish you so you can learn what not to click.
Microsoft is set to release 9 patches next week, double what it issued in July of 2011.
Next week hundreds of thousands of Internet users could lose their Internet access. What's it all about and what you can do to make sure you're not at risk today.
Is it becoming more difficult for hackers to exploit software vulnerabilities?
Microsoft and Adobe take aim at DigiNotar in latest round of patch updates
HP takes aim at emerging security threats with the expansion of its integrated solutions.
Linux.com and Linux Foundation sites shut down as kernel.org hack collateral damage radius expands
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?