Sharing intelligence on security threats is an old idea getting new cred, thanks to Facebook's new Threat Exchange. But how well do such exchanges work?
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
While biometric authentication and other password alternatives abound, traditional passwords remain the go-to method of authentication due to low cost.
VeraCrypt, a popular open source encryption alternative to TrueCrypt, is at a crossroads as its primary contributor lacks the time to maintain it on his own.