Team discovers classic drive-by download attack on YouTube infecting users by exploiting client software vulnerabilities
Half-day event to address new, sophisticated attacks being launched against enterprises
Imperva will resell Informatica's data masking technology
Companies to integrate Identity Finder's Sensitive Data Manager enterprise solution with Verdasys' Digital Guardian and Managed Service for Information Protection offering
Adopting secure development, incorporating frequent testing, and creating measures of software security are important to create more secure code
Thanks to a significant software update, the Google+ Hangouts iOS app is now an even more compelling alternative to Skype, according to CIO.com blogger James A. Martin. Here's why.
The retailer announces the resignation after data breaches affecting up to 110 million people
Microsoft's government security expert warns that there's no such thing as perfect security, so systems must be able to adapt and respond to attacks on unforeseen vulnerabilities.
American workers don't get too worked up about lost or stolen mobile phones -- even if those phones contain company data. A large percentage think it's not their problem and don't change their security practices afterwards. Are CIOs partly to blame for not setting stricter and clearer mobile security policies?
An analysis of IBM's new BlueMix project, which puts most of IBM's software in the cloud, reveals that 80 percent of IT spending goes to legacy systems. As organizations finally learn to stop worrying and love the cloud, IT departments will have to decide if they will continue to be a money pit or can find a way to add value to new cloud systems.
Freescale announces support from Silicom and Green Hills Software for its C29x crypto coprocessor
Announcements are part of BlackBerry’s ongoing strategy to stabilize the company and restore customer confidence
Entrust IdentityGuard 10.2 Feature Pack 1 will include 3M Cogent biometric fingerprint capture and verification technology
Transaction malleability attacks and cold-storage software bugs both cited after nearly $500 million worth of bitcoins vanish
Wickr is an encrypted, self-destructing messaging app, serving more than 1 million messages each day
Mikko Hypponen reflects on shift toward rampant government spying and use of malware -- and targeted attack attempts on F-Secure
A security expert identified a new scam that uses an elaborate form of phishing to target Netflix subscribers.
Cisco is seeking solutions for malware defense, security credential management, and privacy protection
Hackers launch scam and malware campaigns after compromising a variety of routers running firmware with known vulnerabilities
How Michael Smith, CIO of Mylan, used a simple tool to drive a major transformation.