Security | News, how-tos, features, reviews, and videos
The credentials provided access to accounts on Amazon Web Services, Slack, Dropbox, Twitter, and other services
Find out the various characteristics of a variety of underground markets that offer services for cybercriminals to profit from
Countries need to work together to craft an online counternarrative, security experts say
IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie
Google's Key Transparency project offers a model of a public lookup service for encryption keys
Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud
Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message
The Shadow Brokers released hacking tools designed to spy on Windows systems after attempting to sell a large cache for bitcoin
A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization
Nominee Mike Pompeo has called on Congress to reverse its 2015 decision to rein in the phone metadata collection program run by the NSA