Cybercriminals use many different types of malware to attack systems. Here are some of the most common malware types and how to defend against them. We define everything from adware to worms and everything in between.
Once again, Mozilla is quick to deal with a zero-day exploit first demonstrated at the Pwn2own hacking competition.
If you're considering using the FIDO U2F protocol, here's what you need to know.
Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]