Hilton Worldwide is the second hotel chain in recent days to admit it has been breached. The news follows Starwood Hotels and Resorts' breach disclosure.
Security firm iSIGHT Partners warns retailers that a silent thief may be in their point-of-sale systems, an assertion that at least one other security firm disputes.
Just before Black Friday and Cyber Monday, a report comes out claiming that the top 10 mobile payment apps are all missing critical security controls.
Dell installed a root certificate on new machines, in a security faux pas similar to Lenovo's Superfish.
Fortscale's user behavior analytics software can identify and eliminate insider threats by using machine learning, analytics capabilities and context-based alerting.
Zscaler finds two instances in which mobile malware authors are luring victims with lurid Android apps.
Starwood Hotels and Resorts is investigating data breaches at 54 locations. Attackers gained access to credit card information.
Zerodium reveals what it pays for a wide range of flaws, and surprisingly, its numbers aren't all that odd.
A recent ransomware operation uses an uncommon peer-to-peer system to collect data about users and distribute the important security keys to those who are willing to pay to get their data back.
New technology that is landing at Levi's Stadium takes a robust approach to physical security.
Although the author of Blackhole was arrested in 2013, the exploit kit has risen again as malware developers make use of leaked code from the software.
The startup exits stealth mode with a new approach to enabling security in the cloud.
NEWS ANALYSIS: Security experts say building in-depth cyber-defenses is the best way to resist the increasingly sophisticated attacks on enterprise networks.
The new facility will gather expertise from various Microsoft business units for proactive, intelligence-driven security services and software enhancements.
Cylance's security package, already in use by a number of government agencies, has been charted to stop a whopping 99 percent of malware and advanced persistent threats.