Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
An appeals court rules that, under CA labor law, employee use of personal cell phones must be reimbursed, even if the employee has an unlimited or flat rate plan.
Itus Networks is building a router that has the Snort IPS built in. Why isn't everyone doing this?
UPDATED. Customer reports of blue screens of death and reboot loops have led the company to withdraw several updates and recommend that users uninstall MS14-045.
When you make security hard to use, users look for a way around it. That's why efforts to make the internet more secure must be held to a high usability standard.
In addition to what is clearly malware, Chrome will now warn of programs that change the system or browser configuration deceptively.
If you missed Black Hat USA 2014, we've got good news: Some of BHUSA's best talks now have videos and presentation materials online.
Updates released today address a total of 37 vulnerabilities in Windows, Internet Explorer, Office, SharePoint Server 2013, the .NET Framework and SQL Server.
A flaw in Adobe Acrobat and Reader for Windows is being exploited in the wild. Critical vulnerabilities affect all versions of Flash Player.