This is a I-screwed-up post. And it's a clear-the-air post.
In addition, VentureBeat has discovered, Authentec has discontinued both the original security software and its replacement ... and deleted the evidence from its website (though not from Google's cache).
The U.S. Congress Intelligence Committee and telecommunications vendor Cisco are agreed on one thing: Chinese networking equipment companies can't be trusted.
Ensafer is one approach to cloud security. It’s a product for end-to-end encryption — that means your stuff, whatever it is, stayed encrypted through transporting, sharing, storing, etc.
Secure cloud hosting company FireHost raised $10 million in its third round of financing.
A draft of a White House executive order on cybersecurity has leaked out, but it's pretty vague.
iPhones hear the name "Charlie Miller" and run, Siri screaming her mortal fear. Now Twitter employees will hear the name "Charlie Miller" and will know their hacker coworker is securing the company's mobile apps.
The good news is that only 1.5 percent of Android apps are malicious. The bad news is that malware is up 216 percent in just three months.
Duo Security's app X-Ray found that over 50% of Android have unpatched vulnerabilities.
Editor's Pick Jack Dorsey confessed something on stage here at Techonomy Detroit today: He hacked into the world's largest dispatch company's email system in order to get a job.
Tenable Network Security has taken $50 million in its first round of funding for its software that protects against cyber crime.
Apple may have a patent on unlocking a smartphone via gestures, but Google just won a patent for unlocking any computing device just by looking at it.
The future of the top U.S. Bitcoin echange is in doubt after $250,000 in virtual currency was stolen last night.
As CNet reports, an unidentified hacker found and absconded with an unencrypted backup of virtual wallet keys, taking 24,000 bitcoins, each worth just over ten U.S. dollars. It's the virtual equivalent of leaving your wallet on the cafe table as you go to use the restroom.
Mobile malware has exploded this year, growing almost 700 percent over 2011 numbers. Almost all of it, perhaps 85 percent, targets smartphones running Android.
Microsoft's new service agreement gives the company the ability to share a user's data with all of its cloud-based services.
Guest Post Last night's changes to Microsoft's Services Agreement mean only bad things for users.
In a statement sent to media outlets yesterday, Apple said it takes security very seriously, but it directs users to use Apple's own iMessage service instead of texting.
While dedicated hackers can be an annoyance to companies like Apple, they can sometimes be helpful when it comes to digging up potentially devastating security vulnerabilities.
Imagine this: you phone your bank, asking a service rep to pay a phone bill and transfer money from savings to checking. Only, instead of talking to the bank, you're speaking to a crook who is talking to you on one phone ... and your bank on the other. And when you provide him with all the authentication details your bank requires, he loots your account and transfers your funds into accounts he controls.
The latest WikiLeaks release has shone a spotlight on an alleged domestic and foreign surveillance program run with cloud-based software provided by Texas company TrapWire, many of whose top leaders and employees are former members of three-letter American intelligence agencies.