Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Starting in 2016, the tech giant will require certificate authorities (CAs) to migrate from SHA-1 to the stronger SHA-2 cryptographic hash function when issuing X.509 certs.
The intruders used the certificate to sign malware that appeared to be a legitimate update for Opera. A few thousand people may have been infected.
In light of the RSA-NSA controversy, a number of speakers, who originally planned to speak at RSA Conference 2014, pulled out and formed a lineup for TrustyCon.
The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.
According to FireEye, China-based espionage group "APT12" has infiltrated the networks of several organizations, as recently as June, with new malware variants that are difficult to detect.
Nation-states are extricating intellectual property from U.S. government entities and private corporations, reports David Cotriss.
In the spirit of keeping up with advancements in information security, we take the December issue to examine those companies that will likely generate advancements.
After a quiet year on the advanced malware front, we could soon see more activity, says the Atlantic Council's Jason Healey. Karen Epper Hoffman reports.