The agency says restructuring will bring it to the digital forefront -- and digital intelligence gathering is now critical.
Sensitive data held by the university has been compromised -- including the Social Security numbers of students and employees.
A collection of notable security news items for the week ending March 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Arrested 10 months ago by Australian Federal Police, Anonymous radio host LoraxLive (Adam Bennett) faces a prosecution struggling to pin charges on him.
Tech companies aren't allowed to tell you when the government wants your data. Enter the warrant canary.
After admitting to a security breach, the luxury hotel chain has managed to remove malware discovered on systems related to customer financial data.
Hillary Clinton's homebrew email solution potentially left the communications of the top US foreign affairs official vulnerable to state-sponsored hackers. The post Why Clinton’s Private Email Server Was Such a Security Fail appeared first on WIRED.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a bug bounty program -- but something may be missing.
Intel Security’s McAfee Labs recently published its Hacking the Human OS report, which details a number of ways in which cybercriminals rely on victims’ trust in a particular brand or public authority to hand over information or allow their systems to become infected with malicious code. Show More Summary
A bill aimed at reforming a 30-year-old law, which allows the government warrantless access to old emails, has considerable bipartisan support.
Terrorist groups such as ISIS and Al Qaeda have something in common -- they are using encryption tools which are not worthy of the name.
Google's new Cloud Security Scanner allows users to easily scan applications for two common vulnerabilities: cross-site scripting, and mixed content.
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Long awaited sequel hits theaters June 24, 2016 Trending Independence Day ID4 ID4 Forever Will Smith Jessie Usher Liam Hemsworth
Superfish isn't just adware -- it can also be a nightmare for those who value their privacy.
The former NSA contractor turned whistleblower said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.
FireEye's Mandiant M-Trends report says impersonation and social engineering are now key tactics used by cybercriminals targeting corporations.
We've held 10 Suits and Spooks events since 2011. Who have been some of your favorite speakers? Beginning July 1, 2015, Soho House, our Suits and Spooks home in NYC, will be closing the Library (our past venue) for renovations and will turn it into a members-only space, which means that we won't be able to hold future events there after June 30th. Show More Summary
A Wednesday press conference will aim to quell fears that the UK and US intelligence agencies have unfettered access to our mobile devices and phone calls.