Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
FireEye has released a detailed report suggesting that state-sponsored attacks originating from Russia have focused on lifting military, government and security information.
Big Blue has unveiled a new enterprise solution aimed at harnessing Big Data to detect criminal activity in seconds.
The latest vector for exploits of the Shellshock bug in the Bash shell is SMTP, where the mail headers themselves trigger the exploit.
Fake transactions from Brazil take advantage of implementation errors to approve what appear to be chip card purchases without the PIN. Hint to banks: It's "Chip AND PIN," not OR.
Researcher finds malicious Tor exit node which envelops Windows EXEs inside another Windows EXE which drops malware.
A collection of notable security news items for the week ending October 24, 2014. Covers enterprise, controversies, reports and more. UPDATED.
In a move that has surprised and angered security researchers, chip maker FTDI has admitted to issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips. UPDATED.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.