What's the best way to check for keyloggers?
Ask a question
In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.
Apple has issued a statement regarding the hacking of dozens of celebrities' cellphones that exploded over the weekend.
AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.
Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards.
Better than 2013 but still not good enough.
That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
It's not ready for prime time yet, but the early builds of a new privacy-focused chat client are promising.
If photos were stolen during a cloud hack, enterprises may be more skittish over cloud use.
A targeted attack focused on user names, passwords and security questions of Apple accounts gave hackers access to nude photos of celebrities that were then leaked over the weekend on the Internet, the company said Tuesday.
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
White Papers & Webcasts