Security | News, how-tos, features, reviews, and videos
Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts
Shodan is now offering the Malware Hunter scanning tool, which uncovers systems manipulated to control malware-infected devices
The Xen paravirtualization mode is proving to be a constant source of serious vulnerabilities, allowing attackers to escape from virtual machines
Project Sopris looks to create a set of secure layers that protect both hardware and their communications, and it can refresh a compromised device
Companies that lead with application security have security practitioners willing and able to lead
The Android security bulletin for May covered fixes for over 100 vulnerabilities
The security hole involves enterprise IT remote management features in the chipmaker’s firmware
It's now feasible to secure smartphones using virtualization, a technology the NSA currently requires only on tablets and laptops
IT pros identify what they like, and don’t like, about network monitoring software from CA, Microsoft, and other vendors
SNMP authentication bypass flaw could be used to hijack hundreds of thousands of cable modems from around the world