Security | News, how-tos, features, reviews, and videos
Remote attackers can bypass authentication on Cisco RV220W wireless network security firewalls
EU and U.S. negotiators are struggling to reach agreement on a new transatlantic data-transfer agreement ahead of a Jan. 31 deadline set by privacy watchdogs
JSPatch could allow malicious developers to bypass Apple's strict application review process and access restricted iOS functions
The updates fix issues in how some Diffie-Hellman parameters are generated, and they close up SSLv2 protocol weaknesses
Browser vendors are moving away from plug-ins. Now Oracle is encouraging developers to migrate Java Applets to the plug-in free Java Web Start technology
A ubiquitous and often unprotected networking protocol, DNS makes a tempting target for hackers
The app overlays system dialogs on top of the device administrator confirmation window and hijacks users' clicks
The U.S. government dangerously seeks access to cloud data anywhere. There's a better way that business should support instead
Native mobile and DevOps will be a continued focus, and "cloud computing" will become simply "computing"
The House of Representatives wants to gauge the impact of the recent Juniper ScreenOS backdoors on government departments and agencies