The fate of the bulk collection of American phone records by the National Security Agency is now...
Business leaders once again expressed concerns about rising medical costs at a higher rate than...
The fate of the government's bulk collection of Americans' phone records is unclear following an...
Hybrid car batteries are becoming an increasingly popular target for thieves in the San Francisco area.
Researchers at Northwestern University have developed a new kind of sophisticated invisible ink that they say can be used to create codes that would be nearly impossible for counterfeiters to duplicate.
Mounting threats to cybersecurity are pressuring businesses to evaluate the security of their networks.
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies.
Breaches and attacks have gotten worse and will continue to get worse until the computer security world changes its mindset, says RSA President Amit Yoran. Elizabeth Weise reports from the big cybersecurity conference in San Francisco.
Organizations continue to exhibit "sizable gaps" in their cybersecurity protocol, according to the latest annual data breach report from Verizon.
Cybercriminals will exploit vulnerabilities in new technology as they figure out how to make money from such activities, say a group of security experts.
In this day and age, due to such aggressive attacks by hackers, every company should assume that they have been or will be hacked. Activate founder Michael Wolf discusses cybersecurity in the wake of the Heartbleed bug and recent company hack attacks.
A new group of international cybercrime fighters claimed one of its first kills Thursday, pulling the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States.
AT&T is paying $25 million in a settlement with federal regulators over data breaches at call centers.
President Barack Obama on Wednesday authorized a new U.S. government approach to deterring cyberattacks: financial sanctions against malicious overseas hackers and companies that knowingly benefit from the fruits of cyberespionage.
A new report from Deloitte and the Manufacturers Alliance for Productivity and Innovation recommends that manufacturers convert their risk management practices to "an ongoing conversation rather than a periodic presentation."
Tech expert and Chief Technology Officer at SRV Network, Inc., Karl Volkman, returns to give his tips for catching a hacker.
Forget about forgetting passwords — Yahoo has introduced a system for sending single-use passwords on demand to mobile phone users, while Microsoft is proposing "biometric authentication,” in which your computer must recognize your face, iris or fingerprint to grant you access
Tapping the full potential of smart, connected devices hinges on having physical security and access-control technologies and processes capable of protecting the new streams of industrial data.
The Justice Department is at odds with Google and privacy groups over the government's push to make it easier to locate and hack into computers in criminal investigations, a simmering conflict with constitutional and policy implications.
Pkware CEO Miller Newton discusses Apple Watch security features.
Millions of people may have been left vulnerable to hackers while surfing the web on Apple and Google devices, thanks to a newly discovered security flaw known as "FREAK attack."
Gary Kovacs discusses the importance of securing your smartphone.
The Federal Communications Commission voted Thursday to protect so-called "net neutrality" by establishing uniform standards for those using the Internet.
Goldman Sachs CEO Lloyd Blankfein says securing the bank's technology is "anxiety producing" and that "it would be foolish to make claims of perfection" because "the reliance on technology is one of the biggest risks we all have."
In 2014, organizations were caught off guard by the increase in advanced threats targeting vulnerabilities within business-critical applications. In order to ensure that this information is secured, manufacturing organizations must implement measures that eliminate any and all threats to the business before they evolve.
A little-known Silicon Valley startup was caught in a firestorm of criticism this week for making software that exposed Lenovo laptop users to hackers bent on stealing personal information. But Superfish Inc. has also won praise for producing visual search technology that many see as the next big thing in online shopping.
Experts say the world's biggest computer maker shipped laptops with pre-installed software that could let hackers steal passwords or other sensitive information when you use the web to shop, pay bills or check email.
It's not a bird or a plane, but a blimp in the sky, floating over Maryland's Baltimore suburbs. It's the newest security system launched by the Army to protect major cities along the East Coast, and it can detect everything from a cruise missile to a large drone.
- Page 1