Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.
A fingerprint spoof created in September 2013 to bypass the Touch ID on the iPhone 5s was used to bypass the fingerprint scanner on the Samsung Galaxy S5, which was released on Friday.
Oracle's Critical Patch Update (CPU) plugged 37 holes in the popular Java browser plug-in.
Defense Secretary Chuck Hagel recently announced the recruitment efforts during a speech in Fort Meade, Md.
Researchers proved the Heartbleed bug was real in a challenge issued by CloudFlare to prove private keys can be stolen, right around the time companies are claiming they were breached because of the critical flaw.
About 55,000 VFW members may have personal information at risk after an attacker seeking military intelligence gained access to a VFW web server.
More than 1,400 medical records were compromised after unauthorized access was gained to the health records system used by a Texas cardiology clinic.
A website security breach resulted in a compromise of data - including Social Security numbers - for thousands who applied for government jobs in Bibb County.
Today marks my final day at SC Magazine after more than 7-1/2 years.
Ideas are needed on ways to improve the public's perception of computer security hackers who have no malicious intentions.
An investigative report shows the Obama administration's insider threat program is far more expansive, and troubling, than even critics had thought.