Don't-Miss Security Stories
A close look at Apple's iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference.
What happens in email, doesn't stay there. But you knew that already.
A security expert discovered the massive breach of Adobe's network after the source code of numerous products, including the Web application development platform ColdFusion, sat parked on a hacker's unprotected Web server open to the Internet.
Facebook has announced new changes to the way Graph Search discovers information, including the fact that status updates, photos, check-ins, and comments are now included in search results. This new stream of information offers criminals developing phishing campaigns all-new attack surfaces to exploit.
Nearly 3 million customers are affected by a hack in which criminals gained access to customer information, including IDs and encrypted passwords.
Mocana will soon let companies wrap iOS 7 apps in a layer of security software designed to insulate enterprise data from hackers.
Google's latest Chrome browser update fixes 50 security problems and gives users the capability to use images as search queries.
In his keynote address at a security conference, Apple co-founder Steve Wozniak admitted he has enjoyed many adventures in hacking often for the sake of pranks, especially in his college days and the early years of working on computers and the Internet.
iOS 7's Activation Lock makes it easier to keep would-be thieves out of your iPhone and iPad. Can it reduce crime, too?
The latest version of the mobile OS fixes two bugs that let users use a locked iPhone without entering the passcode.
Spam volumes took a usual seasonal drop in August, but phishing spiked, including a noticeable interest in hijacking Apple accounts.
Apple's new fingerprint technology may have been hacked, but that doesn't mean you should just give up on it.
Apple's Touch ID authentication system can be defeated using a well-honed technique for creating a latex copy of someone's fingerprint, according to a German hacking group.