A young company has a new patent for using fault tolerance techniques to protect against malware infection in applications.
The change is a complete departure from Google's previous practice of keeping sign-in for Chrome separate from sign-ins to any Google service.
At Ignite 2018, security took center stage as Microsoft rolled out new security services and promised an end to passwords for online apps.
For cybercriminals, the Dark Web grows more profitable every day.
A citizen of the former USSR is sentenced to 168 months for running Scan4you, an online counter antivirus service.
While the concept may sound appealing, it's rife with drawbacks and dangers.
How Park Jin Hyok - charged by the US government for alleged computer crimes for the Sony, Bank of Bangladesh, WannaCry cyberattacks - inadvertently blew his cover via email accounts.
Attack against the Metropolitan Police Department was disrupted before malware could be sent to additional systems.
Move beyond generic, annual security awareness training with these important tips.
The White House is changing the rules on its use of digital weapons to fight adversaries targeting US networks.
Industry leaders are scrambling to address the issue, which will take new thinking to overcome.
The DHS directive on email security has an approaching deadline that most departments in the executive branch might actually meet.
Seasoned red teamers explain the value-add of a red team, how it operates, and how to maximize its effectiveness.
A "point-in-time" approach to PCI compliance could be one reason why so many retailers appear to be having a hard time.
More than three-quarters of ATOs resulted in a phishing email, a new report shows.
What's causing the uptick? Motivation, opportunity, and new capabilities.
The incident highlights a broader problem of poor security in cryptocurrency exchanges throughout the country.
Actionable advice for tailoring the National Institute of Standards and Technology's security road map to your company's business needs.
Suit underscores longtime battle between vendors and labs over control of security testing protocols.
A new report shows that illicit cryptomining malware is growing by leaps and bounds on the networks of unsuspecting victims.