Stopping massive data breaches like the one that hit Target will require a more sophisticated, collaborative approach by law enforcement agencies around the world, a security expert argues. ...
The study claims consumers will spend $25 billion on pirated software and associated software fixes and waste a collective 1.2 billion hours this year dealing with issues related to that software. ...
A company called mSpy now can convey to you phones preloaded with spying software that could tempt you to monitor texts, calls and, well, pretty much everything. Now that's caring. ...
The company says, however, that the amounts shown on the site do not "constitute a filing of rehabilitation claims." ...
Don't click that link! Viral Facebook posts with shocking video of Malaysia Airlines MH370 are a scam. ...
IBM has categorically denied any involvement with the NSA's spying spree, and insists it has never handed over client data in the name of surveillance. ...
Mobile security remains a struggle: CanSecWest calls attention to flaws in Android and BlackBerry 10, while a newly discovered encryption weakness in iOS 7 could put iPad and iPhone owners at risk. ...
Twitter has been banned from China since 2009, but could be an extremely lucrative market for the service if the ban could be lifted. ...
A "significant" DDoS attack targeted NATO sites but did not affect the integrity of the organization's systems, a spokesperson says ...
Government watchdogs have scrubbed from the Web the accounts of several journalists as Beijing wraps up its annual parliament meeting. ...
Nearly $4 million dollars in prize money between Pwnium and Pwn2Own drives more attention than ever to the two hacking contests, as Google crosses the $3 million security award mark. ...
That's the word from Replicant, a company that makes its own Android software based the concept of replacing proprietary components with free software. ...
Developers working on Replicant, an open source OS based on Android, claim to find a flaw in that provides access "to read, write, and delete files" storied on some Samsung devices. ...
Despite alerts received through a $1.6 million malware detection system, Target failed to stop hackers from stealing the credit card information of millions of customers, says Bloomberg. ...
Claims of security hole involving SD cards don't paint an accurate picture, say the makers of the popular chat app. ...
The day before two annual Google-sponsored hacking contests kick off at a security conference in Vancouver, Google tidies up some of Chrome's loose ends. ...
The way we secure digital transactions could soon change. An international team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust -- a situation encountered often on the Internet and in everyday life -- for example, at a bank's ATM. ...
The US government designed computerized hacking tools to automate the process of compromising computers with attacks that let it harvest the data it wanted before encryption, new documents show. ...
One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer. Physicists aren’t surprised by this news; such a computer could crack the encryption that is commonly used today in no time and would therefore be highly attractive for the NSA. ...
Using unsuspecting WordPress sites as amplification vectors, a hacker takes down a popular Web site for hours. ...