USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
Impossible? Apparently not, as US researchers have discovered.
Security researchers at FireEye claim the majority of the most popular free Android apps are susceptible to Man-In-The-Middle (MITM) attacks.
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
An appeals court rules that, under CA labor law, employee use of personal cell phones must be reimbursed, even if the employee has an unlimited or flat rate plan.
Itus Networks is building a router that has the Snort IPS built in. Why isn't everyone doing this?
UPDATED. Customer reports of blue screens of death and reboot loops have led the company to withdraw several updates and recommend that users uninstall MS14-045.
When you make security hard to use, users look for a way around it. That's why efforts to make the internet more secure must be held to a high usability standard.