Hacked site numbers continue to increase, according to Google. Businesses must take steps to ensure their online properties are safe and secure.
Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.
The classic image of the Hollywood hacker is misleading. The typical cybercriminal is more likely to be a state-sponsored actor or malicious insider.
A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.
An anonymous actor compromised mobile phone hacking company Cellebrite and stole 900 GM of potentially compromising information.
'Twas the hack before Christmas, the time late December. While IT professionals are home with family members, cybercriminals are planning their next moves.
This list of notable 2016 data breaches can serve as a cheat sheet for a security professional who is pressed for the latest tech news during the holidays.
A recent Dailymotion hack means the account details and email addresses of 85 million users have potentially been compromised.
Companies have a vested interest when it comes to ferreting out IT problems before cybercriminals manage to launch attacks in the wild. The recent Mirai infections are proof positive that compromised Internet of Things (IoT) devices paved the way...