AppLock sports several vulnerabilities that could allow an attacker to access content, and to reset, change, or remove the PIN code.
There has been an explosion of new neighborhoods on the Web, many of which may be considered for web security purposes as neither safe nor friendly.
As the losses sustained by firms in the US and around the world passed the billion dollar mark, the FBI is once again warning businesses about BEC scams.
Sysadmins around the world have been provided with another helpful guide on how to go about hardening their Linux workstations.
Nishad Herath, Principal Anti-Malware Technologist at Qualys, talks about CPU hardware performance counters.
Here are the major considerations organizations should incorporate into their compliance programs, as well as pitfalls that can be avoided to ensure businesses stay compliant while using cloud computing.
Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security.
McAfee Labs compared what researchers thought would happen beginning in 2010 with what actually happened in the realm of hardware and software security threats.
Researchers from Palo Alto Networks and WeipTech have unearthed a scheme that resulted in the largest known Apple account theft caused by malware. All in all, some 225,000 valid Apple accounts have been compromised.
35 percent of security experts believe leadership within their organization lacks a healthy paranoia, with 21 percent of leadership "relying on hope as a strategy" to avoid a cyber security breach.