In addition to Facebook, this tough malicious bug may be infecting targets across the Web.
Malware creators spread their malicious content via the comments section.
The figures for ID theft are growing at an alarming rate.
Industry observers say they're noticing spim levels increasing, a move that echoes an earlier trend.
Adobe has patched its Flash application, yet some experts say that concerns linger.
The administration's focus on the dangers of cyber attacks is getting positive marks from industry observers.
The recent problems are just the start, industry experts say.
A recently discovered flaw allows hackers to target executives and government offices.
Hackers have an inordinate fondness for attacking the large public university.
A cyberattack sends text messages to victims' contacts -- but it may do still more damage.
Please, whatever you do, be careful of that Word attachment in your inbox.
Big players in the enterprise encryption key field agree on standardization.
Redmond gathers forces from many industry to combat the Conflicker worm adding a $250,000 bounty.
Social networking site is grabbed by malware creators.
Given that love is blind, spammers get all tingling as Valentine's Day approaches.
A security expert claims that cybercriminals are using Digg.com to spread malware.
Investigators looking into separate crimes discover a breach impacting 30,000 employees.
Rogue Sys Admin, due to court to face three felony charges, has his hearing delayed.
The software giant takes steps to improve security and tackle the increasing threat of Web-based attacks.
While Microsoft mulls laxer controls on user privileges, new research indicates that tighter restrictions may be the safest bet.
Homeland security advisers press for greater oversight by privacy officials.
Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study.
But damage by outsiders can be even more expensive.
With cybersecurity, information sharing and risk analysis on the agenda for next week, the new Homeland Security secretary is looking to patch holes, fast.
Is corporate security fighting yesterday's war with last decade's weapons?
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?