More malware targeting Google Android devices but pretending to be legit apps managed to sneak into Google Market over the long holiday weekend. Google is taking steps to yank them.
Now that Microsoft has bought Skype, some observers are calling on the software giant to improve the Voice over IP service so that it's easier to manage in an enterprise setting.
The volume of phishing attacks dropped in 2010 to less than a quarter of what was seen in the previous two years, according to IBM's annual research report on threats and risks.
As adoption of smartphones and tablets explodes, security will become a bigger issue. Mobile security was the topic of a panel discussion involving both AT&T and Verizon at this week's RSA Conference.
A University of Luxembourg student demonstrated how it's possible to trick iPhone users into joining a fake GSM network.
The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application of 2010 so far, based on data available in the National Vulnerability Database.
A new study of 45 U.S. organizations found that cybercrime -- including Web attacks, malicious code and rogue insiders -- costs each one an average of $3.8 million per year.
Hundreds of thousands of Facebook users were hit over the holiday weekend by a trick that spreads a clickjacking worm once the victim has been fooled into...
Identity fraud struck an estimated 11.1 million adults in the United States last year, according to new data from Javelin Strategy & Research.
Apple's sandboxing technology restricts iPhone applications using deny/allow rules at the kernel level, but these and other security permissions are too loose, according to software engineer and security expert Nicolas Seriot.
Spam as a percentage of all e-mail has reached an all-time high, according to two security firms releasing their periodic threat reports Wednesday.
A study by security-products maker Sophos found that Facebook users are prone to give up personal information that could make them the victims of identity theft.
Articles by Ellen Messmer