Researchers demonstrate that mobile phones are exceptionally vulnerable to a browser bait and switch.
A computer security researcher demonstrates attacks on cash machines.
A new approach does away with the need for long strings of letters and numbers.
Approach could help software learn how to identify fake accounts with less honorable intentions.
Device drivers account for most crashes and even introduce security problems; a new testing tool could provide an early warning.
Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it.
To preserve the open Internet we must stop the cyber arms race.
Cyber attacks are increasing exponentially. Here’s what recent episodes can teach us about thwarting cyber crime, espionage, and warfare.
Keith Alexander explains how the U.S. will fight espionage and crime.
Making more user information public has both privacy and security dangers, experts warn.
Security firm aims to make installing updates as painless and invisible as possible.
Security researchers are also working to unravel the nature of the espionage.
After an attack that required staggering skill and resources, the company threatens to quit China.
Companies are increasingly offering security products as services, but is it the best approach?
Protecting an inalienable right in the age of Facebook.