Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem
The security pioneer's appearance at Defcon highlighted the best and worst impulses of the hacker community
Security errors are rife in application development. Here are five of the most egregious -- and common -- missteps
Data breaches have become so common that an etiquette has grown up around them. Any company that observes these nine rules has a good shot at coming through the fire intact
A new contest proposes to spur innovation in hashing methods used to secure passwords and other sensitive data
At CanSecWest, hackers nab major prize money for exposing OSes and browsers. But new zero-days aren't as easy to come by
Hackers still use search engines like Google and Microsoft Bing to accelerate and automate attacks against vulnerable websites
Hackers in a Defcon contest had no trouble persuading corporate workers to cough up private company data