What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.
Security / News
When ransomware criminals lock up files and demand payment to decrypt them, don’t pay but be prepared with backup.
The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.
Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and to force the company to replace all of its customers' certificates.
If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.
The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.
The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services.
The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without permission.
Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency.
Marketing pros and business owners share tips on how to use gaming techniques to attract, educate and retain customers -- and sell more stuff.
Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.
LinkedIn is taking cues from its social networking counterparts and is releasing a separate feed of news articles and topics based on your interests and profession.
The chances of you installing malware on your Android phone is incredibly small, according to Google.
A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.
U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.
An attack discovered by Cybellum called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.
The U.K. is joining the U.S. in its ban restricting passengers from bringing some electronic devices onto flights from the Middle East.
Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
Amid widespread hacking purportedly sanctioned by the Russian government, FBI Director Comey confirms active investigation into potential coordination between Trump campaign and foreign operatives, while shooting down allegations that Obama had Trump Tower wiretapped.
HCL Australia’s service delivery director, Emmanuel Steve Dulvin, speaks about his career, lessons learned and the technologies that will drive the IT services industry in 2017.
- Consultant urges never pay ransomware demands
- Apple: Macs and iPhones are safe from newly revealed CIA exploits
- Microsoft delays tools for third-party Cortana integrations
- Google Play faces cat and mouse game with sneaky Android malware
- To punish Symantec, Google may distrust a third of the web's SSL certificates