The recent report, contributed by 60 companies, lays out what threats loom in the BYOD landscape and what steps an organization can take to secure itself and employees.
The Oracle flaw is being shopped online by an unknown source.
The vulnerability only affects client-side users.
Discovered vulnerabilities this early in the software's lifecycle should be neither shocking or unexpected.
Attackers could have accessed your account in a matter of minutes.
This new scheduling is directly associated with Microsoft's decision to embed Flash into Internet Explorer 10.
A French security company has claimed that it's found a security issue in Windows 8. Want to find out what it is? You gotta pay first.
Why even use a password if you're just going to use easily guessable entries?
Phishers go where the money is.
Starting on Friday, Microsoft's bonanza of software and hardware relases begin.
You had a good half year if you were in the business exploiting application flaws and spreading malware through software key generators.
Phone authentication could be installed in quite a few Microsoft products in the near future.
Has two small security updates in a row put you in a state of complacency?
Microsoft's choice to store passwords in plain text format may give attackers easy access to your system.
When providing antivirus services to paying customers, don't have your own software red flag your software. That seems like a bad business decision.