Security | News, how-tos, features, reviews, and videos
Two Android trojans that steal financial information and login credentials now double as file-encrypting ransomware programs
Vera's approach to information rights management lets IT apply security rules and permissions to Office 365 files no matter where they're saved
Custom-made Thunderbolt devices can be used to extract the encryption password from locked Macs
Employees will not be reading note content unless users opt in, the company said
The massive data breach can be an opportunity to do some cleanup and implement security recommendations
The president-elect is assembling a team for key security positions that has alarmed privacy and civil liberties advocates
Elite hackers-for-hire or state-sponsored actors may have been involved, according to experts
Similar summits could take place as often as once per quarter
President-elect Donald Trump remains skeptical Russia was involved, despite U.S. intelligence findings
The data breach occurred in August 2013 and is not connected to another recently disclosed huge breach