The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.
Security firm Sucuri is warning WordPress admins that a "massive" malware infection is wreaking havoc on WordPress websites. Sites with outdated plugins or weak passwords are particularly at risk.
Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads.
The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.
How often would you let yourself be robbed every single day your business is open, until you decided it might be a good idea to shut the door to the vault?
The problem with thinking that anonymized databases are safe lies in the presumption that they're separate. They're not, as an in-depth report published not on a tech news site but a real...
Some 70,000 takedown requests are being handled by hand, according to Google's legal chief, who's now faced with the task of owning up to all the data Google owns.
A cryptographic protocol involving secret codes and device-to-device handshakes brings into question whether technology can actually drive away the world's last remaining voters.
If someone steals your phone then logs onto your apps, those apps may think they're working with you. What if the connection between you and those apps could be severed first?
The identity assertion language that developers adopted for authentication just four years ago may already be outdated, says someone you'd think would be SAML's evangelist.