- Botnet snatches 2 million logins for Facebook, ADP payroll processor and other sites
- Malware still running rings around security tools, eThreatz testing finds
- 2 million stolen login credentials discovered for Facebook, Google, LinkedIn, Twitter, other sites
- Fake-police ransomware reaches Australia
- Retailers tracking customers via Wi-Fi suggests that privacy really is dead
Google has begun work on shutting a hole in its Chrome browser that lets casual thieves steal website and Web service passwords.
An app that purportedly spoofed a Mac so that Android smartphone and tablet owners could send and receive text-like messages through Apple's iMessage service disappeared today from the Google Play app store.
Nasdaq's unprecedented trading halt today stemmed from a technical glitch with a core data feed that disseminates market data for Nasdaq-listed securities.
Is proprietary software inherently more secure? Or is it the other way around. Security experts weigh in.
Apple on Tuesday patched Java for the aged OS X Snow Leopard and tweaked Safari to give users more control over what websites they let run the vulnerability plagued Oracle software.
Developers being overly trusting is one of them.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
An assessment of the information security department shows that it has a lot of growing up to do yet.
Both Google's and Apple's mobile platforms have security drawbacks and advantages. Is there a clear winner?
When a security manager's company sells software, he can't ignore the potential vulnerability of those products.
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.