Administrators are advised to patch and revoke old private keys
A fake login page looks legitimate since it is served up by Google over SSL, Symantec said
Apple's Mail, FaceTime, Calendar, Safari browser and Software Update could be vulnerable, a researcher said.
The legal uncertainty around Bitcoin may be spooking Apple
A close look at Apple's iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference.
A security expert discovered the massive breach of Adobe's network after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker's unprotected Web server open to the Internet.
Spam volumes took a usual seasonal drop in August, but phishing spiked, including a noticeable interest in hijacking Apple accounts.
Apple's Touch ID authentication system can be defeated using a well-honed technique for creating a latex copy of someone's fingerprint, according to a German hacking group.
Dropbox takes a peek at some kinds of uploaded files. That's normal, the web storage service says.
Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases messages and files.
On the surface, Bitcoin seems to be a great way to hide cash. Actually, it's a terrible way to launder money.
Twitter, The New York Times and other prominent websites were struck by a powerful cyberattack that continued affecting other websites into Tuesday evening, directing visitors to a site purportedly controlled by the Syrian Electronic Army (SEA).
An advertisement circulating on Facebook and Twitter for a desktop version of the photo-sharing application Instagram is a scam, according to security vendor Symantec.
Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K.
Articles by Jeremy KirkNext Page