Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time.
We all need some kind of authentication process if we are to access information systems at work or at home. We know why we need to do it: to make sure we have access to our data and unauthorised people don't.
A federal judge said Wednesday he plans to push ahead with a challenge to the National Security Agency's bulk collection of telephone data on hundreds of millions of Americans, even as the program is set to expire at the ...
Several of the most popular Internet-connected baby monitors lack basic security features, making them vulnerable to even the most basic hacking attempts, according to a new report from a cybersecurity firm.
Malicious software targeting smartphones with the Android operating system is becoming more common, with some handsets already infected when they're bought.