Bad guys are using online advertising networks and popular sites like YouTube to serve malware to unsuspecting Internet users, finds new research from Bromium Networks.
TrueCrypt will stay alive, thanks to devotees who are forking the encryption program's code. 'Cleaned up' code will get a new name, CipherShed, and a different open source license.
Experts believe the Internet of Things will be highly insecure, at least in the early days.
As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.
Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.
You say 'paranoid,' I say 'careful.' Expert offers 'practical' advice on living the paranoid lifestyle.
Security vendors focus on banks not Web-scale companies, says Yahoo CISO Alex Stamos.
Trustwave researchers demonstrate Backoff malware, which targets POS systems, at Black Hat. Attack that has compromised 600 retailers relies on Java.
What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason.
Black Hat keynote speaker Dan Geer has some radical ideas to reshape modern security, including a suggestion that the United States purchase security vulnerabilities and make them public.
With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.
Hackers targeted Microsoft's Internet Explorer with an emerging attack technique called action script spray in the first half of 2014, say Bromium Labs researchers.
Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.
New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.
A layered approach to security is the key to fighting advanced persistent threats (APTs).
As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.
Hackers are increasingly using DDoS attacks as a kind of 'smokescreen' that helps them carry out data breaches.
Third-party vendors played a significant part in a handful of data breaches in May. This is why, experts say, companies must ensure vendors are careful with their data.
Hackers see HR as an easy – and valuable – target. Educating HR staff is a key defense.
Anti-malware software can't spot all malicious code. Is isolating end-user tasks through virtualization a better approach to security?
Retail Cyber Intelligence Sharing Center initiative will make it easy for retailers to share cybersecurity intelligence with each other and with government agencies.
Most IT professionals are stressed out at work, a recent survey suggests. Information security pros are especially stressed, thanks to growing levels of unpredictability.
Would sharing intelligence on hackers and other threats help companies avoid data breaches? At least one expert thinks so.
The CEO of Comodo, a key contributor to the EV-SSL standard, explains why extended validation SSL matters but why you might not always actually need it.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?