Some people think a lot can go wrong if you have your emails pass through LinkedIn's servers with the company's new Intro technology.
Hours after Google's Safe Browsing initiative flagged the website for malware, PHP.net confirmed that two of their servers were compromised and used to attack visitors. However, the administrators are still not sure how the attackers accessed the servers.
The Internet Archive, the online repository of millions of digitized books, wants to shield its readers from other's prying eyes -- like the government's.
Six Eastern European men are being sought by U.S. prosecutors for allegedly netting up to US$3 million by placing fraudulent advertisements for vehicles, motorcycles and boats on major online marketplaces, including eBay.
As security breaches rise, CIOs and CISOs aren't as good as they think they are at protecting corporate assets.
German Chancellor Angela Merkel said Thursday that allegations the United States' National Security Agency hacked her phone is relevant for every citizen that needs to trust digital communications.
Criminals use a variety of tools and tactics when selecting victims and conducting attacks. But information is the key to any malicious campaign, and the more personal it is, the more value it holds. When one goes about their daily life online, how much information is too much, and what should be protected?
Germany's foreign minister has summoned the U.S. ambassador to Berlin to discuss allegations that the mobile phone of Chancellor Angela Merkel has been monitored by American intelligence services.
Security researchers have mixed opinions about the new password manager Apple has included with Mavericks, the latest version of the Mac OS X operating system.
Cisco Systems released software security updates Wednesday to address denial-of-service and arbitrary command execution vulnerabilities in several products, including a known flaw in the Apache Struts development framework used by some of them.
A court order forcing former NSA contractor Edward Snowden's email provider to turn over its master encryption key undermines a critical security feature used by major Internet services, the Electronic Frontier Foundation said Thursday.
Visitors to the official website for the PHP programming language over the past couple of days might have had their computers infected with malware.
The Irish High Court is going to review whether the Irish Data Protection Commissioner's refusal to investigate Facebook's involvement with the U.S. government surveillance program Prism was lawful.
In a move to fight back against governments that try to block their citizens' Internet access, Google released tools to keep people around the world online.
About 4,500 people have indicated they plan to attend a rally Saturday in Washington, D.C., to protest surveillance programs run by the U.S. National Security Agency.
After delays due to the government shutdown, the National Institute of Standards and Technology (NIST) released on October 22 its latest version of a comprehensive cybersecurity framework for critical infrastructure as mandated by President Obama's February cybersecurity executive order (EO). This preliminary framework is subject to a 45-day public comment period, after which NIST will make revisions and then produce a final framework for publication in February.
Our 2013 CSO Compass Award winners all exemplify excellence, achievement and leadership in security
A U.S. appeals court has ruled that police must obtain a warrant prior to using a GPS device to track a vehicle, deciding on an unaddressed issue in an earlier Supreme Court order.
Over the course of his eclectic career, Pettigrew, who's now CSO at HMS, has assembled three security departments from the ground up
The millennial generation, those of us who were born and raised alongside the Internet, should be wise enough to avoid account hijackings and other scams, but we're not. In fact, one out of four millennials have admitted to having at least once incident where an online account was hacked.