Security | News, how-tos, features, reviews, and videos
Cybercriminals are distributing a mobile component of the Zeus banking Trojan as an Android security application, Kaspersky experts said
The security company CloudeyeZ is taking a new approach to helping companies manage data breaches
Researchers from Fujitsu Laboratories, Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University have set a new cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a pairing-ba
Japan was recently the site of two high-profile Android security incidents, one of which landed a number of Tokyo-based IT executives in jail.
A Three-Pronged Approach to Increasing Collaboration While Reducing Security Riskrn
The data, linked to from Pastebin, includes, names, addresses and emails
Cloud security breaches aren't necessarily headline news, but there's a good reason for that: Cybercriminals don't always view the cloud as the target of an attack, but often as a resource to launch an attack.
Exploit modules for the CVE-2012-1875 and CVE-2012-1889 vulnerabilities were added to the Metasploit framework
Investing in law enforcement action against cybercriminals is more important than buying cybersecurity software, researchers say
Marketers are increasingly looking to Big Data to provide the insight they need to create richer, more personalized and more targeted messaging for consumers. But collecting that data without making consumers leery of your brand requires data managem
Ryan Cleary's attorney said her client suffers from Asperger's syndrome and that extradition would be 'totally undesirable'
Sponsored Links