Users looking to find out whether their accounts were compromised in recent major breaches, including Adobe's, can check through haveibeenpwned.com.
Microsoft announced on Thursday that its Digital Crimes Unit - in conjunction with the FBI, Europol's EC3 and technology companies such as A10 Networks - has disrupted a botnet that targets search engines and browsers.
With the monthly update, Microsoft will fix a TIFF zero-day impacting users, but not a serious Windows XP flaw under active attack.
Again, it's the time for the annual "doom and gloom" security outlook for the coming year. Understandable, when after a busy season of attacks it seems likely that next year will only bring worse.
Researchers discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo and Twitter.
After recently impacting banks in South Africa, the malware is now infecting point-of-sale systems throughout the globe, including those in the U.S., a security firm found.
With this year's holiday season here, online retailers should be focused on preparing their networks for increased traffic as well as protection from cyber threats.
Saudi Arabia and Israel are seeking to disrupt Iran's nuclear program by using a computer worm more destructive than Stuxnet, according to Fars News Agency in Iran.
The worm, called "Darlloz," exploits a PHP vulnerability to spread amongst Linux users.
As if 2013 was not exciting enough in the world of cyber security, 2014 will continue to keep us on our toes.
According to Qualys, 39 percent of tested machines contained critical browser vulnerabilities, which users should be particularly mindful of during the holiday online shopping frenzy.
Attacks leveraging the Windows XP kernel vulnerability have been targeted, but limited so far, Microsoft says.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.
The right form of network security can - and will - support continuous monitoring and network security management initiatives.
We must stop the insanity by focusing on the data and controlling privileged user access.
Adobe breach affects 38 million, UK man indicted for hack of U.S. Army network, NIST debuts new cyber security framework, and other news.
December's threat of the month is domain hijacking, a popular attack technique that takes over major domains.
BitDefender's Alexandru Catalin Cosoi discusses role and what he'd like to see occur in the security space.
In the spirit of keeping up with advancements in information security, we take the December issue to examine those companies that will likely generate advancements.
We will not only see a new level of where the bad guys will target but how and what they are attacking, namely hardware. Here are the areas which deserve attention in 2014.
Despite being wary of connecting to unsecured hotspots, the majority of respondents surveyed in a report do not take the necessary steps to ensure their information is secure.
Microsoft plans to roll out new encryption and security measures in response to possible National Security Agency surveillance on the company.
Hacktivist collective Anonymous has taken credit for a distributed denial-of-service attack that unintentionally affected a number of Microsoft services last week.
The issue would allow users to discover Facebook IDs - depending on the targets Facebook privacy settings - and leverage that credential into connecting with the person.
The Bitcoin community has banded together to offer a crowd-funded $10,000 bounty for whoever fixes a Mac OS X Bitcoin LevelDB data corruption issue.
Florida Digestive Health Specialists LLP is notifying about 4,400 patients that a former employee improperly accessed their personal information and photographed the data.
Over the last two months, attackers have opted to spread the malware via the Neutrino exploit kit, researchers found.
Twitter announced on Friday that it has introduced forward secrecy, a type of encryption property that makes decrypting communications close to impossible.