The legal uncertainty around Bitcoin may be spooking Apple
A close look at Apple's iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference.
A security expert discovered the massive breach of Adobe's network after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker's unprotected Web server open to the Internet.
Spam volumes took a usual seasonal drop in August, but phishing spiked, including a noticeable interest in hijacking Apple accounts.
Apple's Touch ID authentication system can be defeated using a well-honed technique for creating a latex copy of someone's fingerprint, according to a German hacking group.
Dropbox takes a peek at some kinds of uploaded files. That's normal, the web storage service says.
With new iPhones comes a new challenge: jailbreaking iOS 7
Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases messages and files.
On the surface, Bitcoin seems to be a great way to hide cash. Actually, it's a terrible way to launder money.
Twitter, The New York Times and other prominent websites were struck by a powerful cyberattack that continued affecting other websites into Tuesday evening, directing visitors to a site purportedly controlled by the Syrian Electronic Army (SEA).
An advertisement circulating on Facebook and Twitter for a desktop version of the photo-sharing application Instagram is a scam, according to security vendor Symantec.
Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K.
Apple is incrementally restoring its developer systems following an intrusion last week the company said may have divulged personal information about registered users.
Security warnings displayed by Web browsers are far more effective at deterring risky Internet behavior than was previously believed, according to a new study.
Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, according to new research.