Security | News, how-tos, features, reviews, and videos
Target paid the price for its apparent failure; other big firms follow the same pattern and could face the same fate, analyst say
The flaw could enable remote code execution attacks
Changes to Fedora, like smart card access control and systemwide policy for cryptography, could end up in Red Hat Enterprise Linux
A software program shipped with some Samsung mobile devices allows access to the file system through the modem
Internet Explorer, Firefox, and Adobe Flash and Reader are the first technologies to fall at the convention; Safari and Chrome are today's targets
The judge had refused permission to the NSA to keep phone metadata beyond five years
It appears from the U.S. bankruptcy filing that Mt. Gox executives knew the gravity of the company's losses up to 19 days before its public disclosure
Catbird, Hytrust, TrendMicro, and Dome9 all offer interesting approaches, but no one product does it all
Bad programming practices open up WhatsApp chat database backups to Android malware attack
Leaked documents show the agency was planning to expand its infrastructure for active attacks since at least 2009