Security News
The way developers of third-party security tools use the Apple code signing API could be exploited by attackers to make malicious code linger undetected on Macs, a security researcher has...
With a nest full of spy capabilities and good hiding techniques, the InvisiMole was able to tunnel under the radar for at least five years.”
Scott Ellis, product manager of Google Cloud Platform, shared proactive steps users can take to prevent data stored on Google's infrastructure from falling into the wrong hands.
A flaw in T-Mobile's website allowing anyone to access customer data highlights the need for internal audits and authentication.
Exploitable Vulnerabilities Could Reveal Plaintext of Encrypted EmailsEuropean computer security researchers say they have discovered vulnerabilities that relate to two techniques used to encrypt...
An important warning for people using widely used email encryption tools—PGP and S/MIME—for sensitive communication. A team of European security researchers has released a warning about a set of...
Rockwell Automation has released updates for its Arena and FactoryTalk Activation Manager products to address various types of vulnerabilities, including a critical flaw that can allow remote code...
TechRepublic's Dan Patterson appeared on CBSN to discuss whether Facebook's new Clear History feature can help regain users' confidence.
TechRepublic's Dan Patterson explains how Facebook's new privacy features work, and why the tools might not actually protect users.
Brand new Domain Naming Service (DNS) Cloudflare is gaining firm ground among internet users. Unlike many other DNS providers, Cloudflare positions itself as a strictly privacy-oriented service....