While enabling a mobile workforce can raise concerns about security, data protection and integrity is typically greater with a hosted solution than with an in-house implementation.
The Blackphone offers a higher level of privacy than other smartphones. CEO Toby Weir-Jones...
Top American officials said Thursday they challenged their counterparts in China to rein in...
A Northern California chemical engineer is facing more than 20 years in prison for a rare...
Cyber forensics experts have developed a way to to steal passwords entered on a smartphone or tablet using Google Glass and other recording devices.
German Chancellor Angela Merkel criticized industrial spying Monday while on a visit to China, which Germany and other governments have cited as a global center for economic espionage.
The National Security Agency programs that collect huge volumes of Internet data within the United States are constitutional and employ "reasonable" safeguards designed to protect the rights of Americans, an independent privacy and civil liberties board has found.
The United States wants to restart a cybersecurity working group that China shut down after the U.S. indicted five Chinese military officers on charges of hacking into American companies' computers to steal trade secrets.
Trying to remember the growing list of letter-number-and-symbol passwords created to access various online accounts can be a headache. But you're not the only one with this problem.
New crime data show Apple's addition of a "kill switch" to its iPhones last September has sharply reduced robberies and thefts, authorities said Thursday.
Microsoft Corp. and four other large American technology companies are using a Manhattan court case to draw a line in the cloud, saying the U.S. government has no right to seize computer data stored outside the country.
Stalker is a tool created by security researchers to show companies and individuals all the information they share when they connect to insecure public Wi-Fi.
The accused have yet to be placed on Interpol's public listing of international fugitives, and there is no evidence that China would even entertain a formal request by the U.S. to extradite them.
When the NSA surveillance program was exposed, the government said they didn't listen to calls, and only collected metadata. But that metadata can actually reveal personal information.
The threat that cyberattacks pose to manufacturers can be seen in the plethora of counterfeit products that flood the global marketplace every year. Manufacturing companies must accept that if their product has value, it’s a target for cyber criminals.
Despite a series of recent data compromises, many still use easy-to-remember combinations, which are easy to steal. Thumbprints and eye scanners have been tried as alternatives, but with little success. One Chicago company charges customers to use military-grade encryption that safeguards passwords to personal data.
The 12th annual survey of cybercrime trends found that online attackers determined to break into computers, steal information and interfere with business are more technologically advanced than those trying to stop them.
A Computer Security Incident Response Plan, or CSIRP, is the plan you turn to when the enemy strikes and you realize you’ve been hit. At that point, there’s no time to wonder, “What do we do now?” With a well-conceived, well-rehearsed CSIRP, everyone involved in the plan will know exactly what to do.
The hackers are winning, according to a survey of 500 executives of U.S. businesses, law enforcement services and government agencies released Wednesday.
China's government announced Thursday it will examine information technology for possible security flaws, a move that comes amid tensions with Washington over accusations of cyber spying.
An Alcoa machine shop worker in Texas has been arrested in what prosecutors call a $1 million scam to order, steal and then resell equipment.
China on Tuesday warned the United States was jeopardizing military ties by charging five Chinese officers with cyberspying and tried to turn the tables on Washington by calling it "the biggest attacker of China's cyberspace."
CNN gains exclusive access to the FBI as it takes down cyber criminals infecting 700,000 victims' computers.
The United States has brought first-of-its kind cyber-espionage charges against five Chinese military officials accused of hacking into U.S. companies to gain trade secrets.
Minnesota enacted the nation's first law Wednesday requiring smartphones and tablets sold in the state to have a remote shut-off feature as a way to deter theft.
A former employee of Nissan Motor Co. was arrested Tuesday on suspicion of illegally acquiring company trade secrets, police said.
In the report, Verizon calls 2013 a year of transition from geopolitical attacks to large-scale attacks on payment card systems. While that sounds like good news for manufacturers, it's only mildly comforting.
A San Francisco supervisor proposed legislation Tuesday requiring smartphones and other mobile devices sold in the city to be equipped with a "kill switch" to render them inoperable if they're lost or stolen.
- Page 1