Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday.
Legal and moral arguments about piracy will never die. But the practical implications of running illegitimate software are what really scares Marco Tabini.
The fingerprint authentication technology, developed by Validity Sensors, may someday replace your smartphone’s passwords and pin numbers.
Kensington's Proximo uses Bluetooth-enabled fobs and tags that enable you to use your iPhone to find your keys or other valuables.
Mac and iOS may have dominated Apple news this year, but they weren't the only developments. Dan Moren and Lex Friedman recount the rest of what happened in 2012.
Agile Bits's from-the-ground-up rewrite of its popular password-management software brings many crucial improvements over its predecessor.
Security expert Rich Mogull runs down Apple's year in security over at TidBits. If it's detail you're looking for, it's here in spades.
A security researcher published on Friday another attack on Facebook's Instagram photo-sharing service that could allow a hacker to seize control of a victim's account.
What's your biggest password weakness? Probably the security questions that let you reset your passwords for iCloud, Gmail, and other services. Keep ahead of the hackers with these tips.
Even if you trust most of your passwords to a password manager, you'll have to remember a few. Here's the best way to make memorable ones without compromising security.