Piracy on the Internet is alive and well as The Pirate Bay file sharing torrent site continues to avoid extinction.
Modern technology is potentially enabling a new era of pickpocketing.
The recent Adobe breach was leveraged by attackers to infiltrate the U.S. government, according to a new report. Should we be surprised?
Metaphors and word play aside, one wonders how one man collected at least $150,000 in under a year and a half for hacking Google technologies.
NSA disclosures continue. How much more information does Edward Snowden have left to disclose? How many other ways are there to be exploited?
PHP.net was hacked and was serving up malware, but that doesn't mean that the open-source PHP language itself is at risk—yet.
The former vice president of the United States was concerned about device connectivity years before it hit the realm of security research.
WordPress 3.7 will likely include automatic background updates for security releases. It's a great idea that many browser vendors have already implemented.
New research shows how phone sensors might be used to track individual users, but in a world where IP addresses, geo-location and cookies already track us, should anyone be surprised?
The Internet of things has the potential to be a bonanza for attackers looking to build massive botnets to power distributed denial-of-service attacks.
The keynote speaker at the SecTor security conference uses a game metaphor to describe the state of security today—but what game is it that we're playing?
Different organizations react differently to security disclosures as events this past week demonstrate, including a Microsoft zero-day vulnerability that continues to be exploited.
NEWS ANALYSIS: At long last, Microsoft's Windows Azure multifactor authentication system lets users set up real security to protect cloud account access.
With all the worry and controversy about the U.S. government's ability to intercept and decrypt Web traffic, the time has come for a User Data Manifesto.
Microsoft is advising all IE 8 and 9 users about the risks of a new remote code execution vulnerability.