A new Federal Trade Commission report recommends best practices for mobile operating systems, app developers, and ad networks.
The latest version of Adobe's Flash Player is the only plug-in that will be spared
HP TippingPoint, the long-time organizer of the annual Pwn2Own hacking contest, has revamped the challenge for the second year running and will offer cash awards exceeding half a million dollars, more than five times the amount paid out last year.
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday.
Legal and moral arguments about piracy will never die. But the practical implications of running illegitimate software are what really scares Marco Tabini.
The fingerprint authentication technology, developed by Validity Sensors, may someday replace your smartphone’s passwords and pin numbers.
Kensington's Proximo uses Bluetooth-enabled fobs and tags that enable you to use your iPhone to find your keys or other valuables.
Mac and iOS may have dominated Apple news this year, but they weren't the only developments. Dan Moren and Lex Friedman recount the rest of what happened in 2012.
Agile Bits's from-the-ground-up rewrite of its popular password-management software brings many crucial improvements over its predecessor.
Security expert Rich Mogull runs down Apple's year in security over at TidBits. If it's detail you're looking for, it's here in spades.