Dropping prices, fast processing speeds and more user-friendly designs have given a boost to this highly accurate biometric technology.
Researchers have revealed, and Adobe has confirmed, that the millions passwords stolen during the breach in October were not originally stored according to industry best practices. Instead of being hashed, the passwords were encrypted, which could make things a little easier for those looking to crack them.
If there's been any lesson learned in the past decade, it's that despite tens of billions having been spent on anti-malware, firewalls, intrusion-detection and prevention systems, and other defensive technologies -- it's just not realistic for enterprise security teams to expect to be able to stop every attack.
Proposals in Congress to end the National Security Agency's bulk collection of U.S. telephone records would compromise the agency's ability to find and track terrorists, representatives of the intelligence community said Monday.
Organizations are showing more interest in cybersecurity through executive involvement and higher spending. Nevertheless, the added attention is new and more resources need to be directed at defending against cyberattacks, a study shows.
BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?
The Finnish government's computer networks have been breached by malware for years, and it is possible secure communications have been compromised, the Finnish Ministry for Foreign Affairs confirmed Friday.
Google has developed a security feature for Chrome that lets the browser detect and stop malware downloads.
Google has added lots of nifty features in the latest version of Android. Unfortunately, for most users of the mobile operating system, they'll have to buy a new mobile phone if they want to get the latest and greatest technology.
State and federal data breach notification laws have changed and are expanding more than a little bit. CISOs and CSOs should start here to expand their knowledge of the increasingly restrictive notification requirements that apply to their organizations.
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client applications installed, suggesting that attackers might target SAP systems in the future.
The U.S. Senate Intelligence Committee Thursday voted to back a "spying reform" bill that critics contend codifies and extends the National Security Agency's controversial phone metadata collection practices.
Ghettos are not good, whether they are at the local, state or national level. They tend to breed unrest, dysfunction and crime that can extend well beyond their borders, undermining the health of an entire society.
Internet companies in the U.S. are demanding that the surveillance practices of the U.S. should be reformed to enhance privacy protections and provide "appropriate oversight and accountability mechanisms."
McAfee says that SMBs are suffering from a false sense of security, basing their claims on a recent study conducted with Office Depot. Those who took part in the study showed a high degree of confidence that their data and devices were safe from attackers, despite industry research and evidence that proves otherwise.
With Android 4.4 KitKat, Google has an opportunity to show that when it comes to security, the next version of the mobile operating system is ready for business. While we don't know whether Google will take up the challenge, security experts provided Wednesday their wish lists of enterprise-pleasing features.
Confronted with the latest revelation from the Snowden disclosures, Gen. Keith Alexander says that the NSA obtains data from tech companies only through a court order.
The co-founder of Liberty Reserve, a now defunct virtual currency that was widely favored by the criminal underground, pleaded guilty on Thursday to money laundering and other charges.
The coffee-and-doughnuts chain operates in 60 countries, so it uses a threat-assessment tool to keep employees safe during international conflicts.
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S. government agency with a high level of cybersecurity awareness, as part of an exercise that shows how effective social engineering attacks can be, even against technically sophisticated organizations.