VIDEO: Dmitri Alperovitch, CTO of CrowdStrike, details the new threat dynamic.
The impact of Google's password leak of 5 million user accounts spreads to WordPress.
NEWS ANALYSIS: Newly released documents show that Yahoo fought the U.S. government's requests to provide user information as part of the NSA's PRISM program.
NEWS ANALYSIS: The upcoming Apple Pay NFC system will complement, not disrupt, the current card and mobile ecosystem by using current infrastructure.
The storage maker converges a long list of new-gen features in a plug-and-play data center appliance.
Days after compromising photos of celebrities were leaked online, cyber-criminals are using fake security alerts from Apple to fool users into giving up their user names and passwords.
Trojans like Dyre, originally designed to steal data from online banking service users, are being repurposed to grab user credentials from other online services.
HP's Application Defender is application security as a service technology that aims to enable applications to defend themselves against attack.
NEWS ANALYSIS: Some reported breaches are real, but in the case of Google, the company itself was not breached and 5 million users are not actually at risk.
NEWS ANALYSIS: An afternoon with Hewlett-Packard's "Bad Guys" reveals that there's a lot more to cyber-security than just thinking evil thoughts.
Attackers are exploiting flaws in Linux and Windows software to turn poorly-maintained Web servers into denial-of-service engines.
A key feature Piston is pushing forward in version 3.5 of its OpenStack cloud distribution is support for Intel's Trusted Execution Technology.
NEWS ANALYSIS: Apple introduces some much-needed improvements in how payments are handled over payment card networks, boosting security and privacy.
The seemingly endless stream of Internet Explorer security flaws continues. Is there an end in sight?
A week after admitting it was investigating a possible security breach, Home Depot confirms that it happened.