Security | News, how-tos, features, reviews, and videos
Cyber criminals are shifting gears from online banking to companies that provide order fulfillment, warehouse management, and other services
Researchers demonstrate a cloud provider's nightmare: How to use a rogue VM to steal crypto keys from neighbors
Don't underestimate the damage insiders can do -- and how little prodding they need to wreak havoc
Obfuscation makes your assemblies hard to reverse-engineer, thereby protecting your intellectual property
Google's Project Zero team discovered two serious flaws in the driver the TrueCrypt full disk encryption program installs on Windows systems
Privacy concerns have swirled around Windows 10 since its launch at the end of July; Microsoft responded Monday
Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices
The new phone integrates with Google's Android for Work program, making it more enterprise-friendly than its predecessor
How realistic is it to 'bring your own keys?' Does your business want the burden of managing and securing its own cloud encryption keys?
The figure -- almost 18 million people -- is a slight increase from two years earlier