Report: Attacks on gas pipeline networks linked to RSA hack, China
Digital signatures used in the spear-phishing campaign against the natural gas industry are identical to those used in the RSA breach, according to a published report.
Digital signatures used in the spear-phishing campaign against the natural gas industry are identical to those used in the RSA breach, according to a published report.
Verizon and Cellcrypt will offer voice encryption for smart phones and tablets running the Android, BlackBerry and iOS operating systems.
ICANN has notified TLD applicants whose information might have been compromised by a software glitch and is offering full refunds to applicants who want to withdraw.
Employees will use personal mobile devices for work anyway; here are tips on making sure it's done right.
A researcher examining early releases of Microsoft's new operating system says Windows 8 makes it harder to exploit vulnerabilities.
DHS alerts operators that "tightly focused" attacks, ongoing since at least December, have compromised a number of organizations.
Current exploit in the wild targets IE for Windows, but Mac, Linux and Android also vulnerable.
Many IT organizations are moving from a non-virtualized application base to one that is service- or cloud-based. Find out where your organization falls on this trend line.
New protocols sponsored by the National Institute of Standards and Technology, the FBI and the Homeland Security Department would make biometric technology interoperable and easier to use.
Most states lack policies on online file storage usage, but CISOs say there is risk in uncontrolled use of these services.