How often should you conduct penetration testing?
Ask a question
For this month's "Patch Tuesday" round of bug fixes, Microsoft has focused on correcting multiple vulnerabilities in Internet Explorer (IE), including one that is already being used in targeted attacks.
Italian police in Genoa have opened an investigation into the use of Skype to trap victims into online sexual indiscretions, which are recorded and used as a pretext for extortion.
Attackers have abused the WordPress pingback feature, which allows sites to cross-reference blog posts, to launch a large-scale, distributed denial-of-service (DDoS) attack, according to researchers from Web security firm Sucuri.
A court in California has prohibited the destruction of phone records collected by the government until further orders, raising a potential conflict with an order last week by the secret Foreign Intelligence Surveillance Court in Washington, D.C.
After about a week-and-a-half, Google finished unclogging a backlog of legitimate messages its Postini spam filter trapped by mistake at the end of February.
Fraunhofer Institute researchers are working to speed up the scanning of mobile app code for security flaws, aiming to offer developers in a few milliseconds the kind of analysis that once required an all-night scan of code.
Mt. Gox, the Tokyo-based Bitcoin exchange that collapsed last month after the loss of around $474 million worth of Bitcoins, has filed for bankruptcy protection in the U.S.
Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, Edward Snowden said Monday.
With robots becoming increasingly powerful, intelligent and autonomous, a scientist at Rensselaer Polytechnic Institute says it's time to start making sure they know the difference between good and evil.
Telling users they must upgrade, and to Windows 8.1, doesn't cut it.