The cost of the Target breach keeps on climbing.According to the firm's latest earnings report, the net expense of the breach stands at $162...
Hi, what are you looking for?
The cost of the Target breach keeps on climbing.According to the firm's latest earnings report, the net expense of the breach stands at $162...
Researchers at Microsoft, AnubisNetworks and Symantec joined forces with law enforcement to deliver a body blow to the Ramnit botnet.
Hackers are exploiting a known vulnerability in a Google Maps plugin for Joomla to launch distributed denial-of-service attacks against enterprises. According to Akamai Technologies'...
Intel Security's McAfee Labs is reporting that the vast majority of the most popular mobile apps found to be vulnerable to man-in-the-middle attacks (MitM)...
What is old may not always be new, but when it comes to hacking, it's still effective.
The Telegram messaging app has security holes that allows attackers to get a peak at users' messages by bypassing encryption, according mobile security firm Zimperium.
Distributed denial-of-service attackers are making it relatively cheap to disrupt targeted sites, according to a new report from Verisign. According to Verisign's latest Distributed Denial...
Researchers at FireEye revealed more information about how attackers can compromise iOS devices.
Even as cyber-threats circulate, the boards of directors at many enterprises continue to remain out of the loop when it comes to security.
A new survey by Enterprise Strategy Group found that improving incident response and detection are driving plans to invest in endpoint security technologies in...
The identity and access management (IAM) space will need to evolve to meet the needs of the Internet of Things (IoT), according to analyst...
Just like clouds can hide sunshine, they can also hide user activity from the security controls deployed by the business in the world of...