Don't-Miss Security Stories
Facebook has announced new changes to the way Graph Search discovers information, including the fact that status updates, photos, check-ins, and comments are now included in search results. This new stream of information offers criminals developing phishing campaigns all-new attack surfaces to exploit.
Nearly 3 million customers are affected by a hack in which criminals gained access to customer information, including IDs and encrypted passwords.
Mocana will soon let companies wrap iOS 7 apps in a layer of security software designed to insulate enterprise data from hackers.
Google's latest Chrome browser update fixes 50 security problems and gives users the capability to use images as search queries.
In his keynote address at a security conference, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks, especially in his college days and the early years of working on computers and the Internet.
iOS 7's Activation Lock makes it easier to keep would-be thieves out of your iPhone and iPad. Can it reduce crime, too?
The latest version of the mobile OS fixes two bugs that let users use a locked iPhone without entering the passcode.
Spam volumes took a usual seasonal drop in August, but phishing spiked, including a noticeable interest in hijacking Apple accounts.
Apple's new fingerprint technology may have been hacked, but that doesn't mean you should just give up on it.
Apple's Touch ID authentication system can be defeated using a well-honed technique for creating a latex copy of someone's fingerprint, according to a German hacking group.
A bug in iOS 7 lets you get to a user's photos, contacts, and even social networking without having to enter an unlock code. Apple plans to patch the vulnerability in a future release.
Dropbox takes a peek at some kinds of uploaded files. That's normal, the web storage service says.
The new updates to Adobe's Flash Player, Reader and Shockwave Player address vulnerabilities that could allow attackers to compromise computers.