The criminals who posted online nude celebrity photos, including those of Oscar-winner Jennifer Lawrence, stole some of the images in a "very targeted attack" on user credentials for Apple iCloud.
The Russian crime ring that amassed more than a billion stolen passwords has shown why businesses have no choice but to add other forms of authentication in securing access to websites and corporate networks.
A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious software, experts say.
Microsoft's combination of application reputation technology and URL filtering gave Internet Explorer a malware block rate that blew pass Google Chrome, Mozilla Firefox and Apple Safari.
Target's failure to act when alerted that malware was in its network is a reminder that spending large amounts of money on technology is a waste without the right people and processes.
A researcher has discovered a weakness in iOS 7 that would enable an attacker to bypass a number of mechanisms Apple uses to prevent exploitation of the operating system's kernel.
A recently discovered hacking group called "The Mask" has set a new standard for malware used in sophisticated attacks against government agencies, industry and research organizations, experts say.
Google has added lots of nifty features in the latest version of Android. Unfortunately, for most users of the mobile operating system, they'll have to buy a new mobile phone if they want to get the latest and greatest technology.
Attacker able to send text message that seems to come from a trusted source, says security researcher
Unlike Google Bouncer, which scans only the Play Store, NQ Mobile's new tool is adaptable for any online market for Android apps
Businesses in new study were five times more likely to have decreased spending on managing security over three years.