Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Whether running on iOS or Android, Facebook's and WhatsApp's messenger apps present a 'winning' combination.
In the public sector and feeling overwhelmed? Focus on the basics, as mind numbing as that may sound.
Training and response is the basis of a new offering that addresses ransomware and extortion attacks.
Researchers compiled a list of the most common brands to impersonate by detecting and analyzing new phishing URLs.
Cyber strategies have become as important as physical weapons in the battle for political advantage. Here's a quick look at four broad categories.
Trump administration's initial lack of a unified front in the wake of Russian election-hacking indictments worries cybersecurity experts.
Alarming, yes, but it's actually an improvement over past years, a new Gartner survey of more than 3,000 CIOs reveals.
The advancement of AI-driven public cloud technology is changing the game of "protection by default" in the enterprise.
Survey exposes poor security practices by the people who should know better.
Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer.
Con artists have been charged with operating a scheme that cost users of American dating websites more than $1.5 million.
Recorded Future says Russia's Federal Service for Technical and Export Control has ability to find, weaponize vulnerabilities under cover of doing technology inspections.
Companies are buying next-gen antivirus and fileless attack detection tools but few have the resources to use them, researchers report.
Russian President Vladamir Putin 'just said it's not Russia,' Trump said.
Here's how to safeguard three other network foundation protocols so they don't become weapons or critical vulnerabilities.
Organizations 'should be restrained from using metadata to identify individual users,' says the Telecom Regulatory Authority of India.
Too many organizations are still operating blindfolded, research finds.
GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation.
Recent fears that this year's most prolific ransomware threat has acquired new WannaCry-like propagation capabilities appear unfounded at the moment.