Security | News, how-tos, features, reviews, and videos
Researchers from Fujitsu Laboratories, Japan's National Institute of Information and Communications Technology (NICT) and Kyushu University have set a new cryptanalysis world record by cracking a 278-digit-long (923-bit) key used in a pairing-ba
Japan was recently the site of two high-profile Android security incidents, one of which landed a number of Tokyo-based IT executives in jail.
The data, linked to from Pastebin, includes, names, addresses and emails
Cloud security breaches aren't necessarily headline news, but there's a good reason for that: Cybercriminals don't always view the cloud as the target of an attack, but often as a resource to launch an attack.
Zero Trust allows you to increase visibility and control to address the security requirements of a decentralized, IoT-driven network infrastructure.
Exploit modules for the CVE-2012-1875 and CVE-2012-1889 vulnerabilities were added to the Metasploit framework
Investing in law enforcement action against cybercriminals is more important than buying cybersecurity software, researchers say
Marketers are increasingly looking to Big Data to provide the insight they need to create richer, more personalized and more targeted messaging for consumers. But collecting that data without making consumers leery of your brand requires data managem
Ryan Cleary's attorney said her client suffers from Asperger's syndrome and that extradition would be 'totally undesirable'
Loading specially crafted virtual machine checkpoint files can result in the host system being compromised
Speakers at Microsoft TechEd touted the virtues of the upcoming Windows 8. No surprise there -- except the speakers were using Windows 8 on tablets, with nary a desktop in sight. Will the strength of Windows 8 on tablets finally get IT and end user
Sponsored Links