Data and Information Security | News, how-tos, features, reviews, and videos
Explore related topics
Businesses will be able to use the Vendor Security Alliance-designed questionnaire to evaluate the security practices of third-party partners
The Verified Access API uses the Trusted Platform Module to cryptographically identify and assess the security posture of Chrome OS devices
A ransomware author was able to collect $121 million in ransomware payments during the first half of this year
The files allegedly were stolen from the World Anti-Doping Agency
The unpatched vulnerability can be exploited to gain root access to servers
Rising fear about Russian hacks of US voting systems could do as much damage as actual breaches, but only if we let it
Attackers can use rogue USB-to-Ethernet adapters to steal credentials from locked Windows, and possibly OS X, computers
'There is a pending lethal attack, and the clock is ticking,' a new report warns
The hack compromised personal information of millions of current and former US federal employees
US officials see a potential Russia covert operation aimed at November's elections