Security | News, how-tos, features, reviews, and videos
Almost all libraries used for implementing some of the Internet's most important security protocols are likely to be vulnerable to the new 'Lucky Thirteen' attacks
Apple's handling of the Java vulnerability provides a textbook example of what not to do in a production environment
Enterprises can take better care of unmanaged devices, the companies say
The Computer Fraud and Abuse Act gives prosecutors too much authority, lawmakers say
Cloud providers face increasing number of DDoS attacks, as private data centers already deal with today
U.S. Department of Energy claims no classified info was stolen by hackers, just personal data belonging to employees
Rigorous input testing, passwords, encryption -- 17 ways to write secure code
Company's CEO and senior director of products explain what works about Neo4J
The February patch was offered today -- ahead of schedule -- and contains fixes for 50 vulnerabilities
First the New York Times was infiltrated by Chinese hackers, then the Wall Street Journal. Can InfoWorld be far behind?