There is a severe -- and worsening -- shortage of information security professionals. Leading industry experts believe it predicts a grave outcome.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
Impossible? Apparently not, as US researchers have discovered.
Security researchers at FireEye claim the majority of the most popular free Android apps are susceptible to Man-In-The-Middle (MITM) attacks.
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
An appeals court rules that, under CA labor law, employee use of personal cell phones must be reimbursed, even if the employee has an unlimited or flat rate plan.
Itus Networks is building a router that has the Snort IPS built in. Why isn't everyone doing this?
UPDATED. Customer reports of blue screens of death and reboot loops have led the company to withdraw several updates and recommend that users uninstall MS14-045.