New technology doesn't define the cyber threat landscape, say researchers crunching numbers from eight years of Verizon Data Breach Investigation Reports.
The Trojan Upclicker evades automated detection tools by monitoring mouse activity to make sure it is dealing with a human before jumping into action.
Despite taking the safe road by predicting that threats for 2012 would be a lot like those of 2011, the CyberEye still managed to only bat about .500.
With security information limited by screen size, even experts can't tell when they're visiting malicious sites, according to a Georgia Tech study.
RIM's long-awaited BlackBerry 10 OS contains a blacklist of passwords that users will not be allowed to use. Maybe it's not a great idea, but it's a good one.
Browsers are getting better at blocking phishing sites, but phishers are getting more nimble at keeping their sites on the move.
Despite the growing number of malicious apps for Android devices, researchers at Georgia Tech found a surprisingly low rate of infections on phones in the United States.
DOD wants a baseline of security standards for defending civilian critical infrastructure and clear lines of authority for sharing information across sector boundaries.
A lack of attention from developers and users to the security of mobile applications has troubling implications for those who would bring mobile devices into the workplace.
The EastWest Institute is holding its third cybersecurity summit in India next week, part of an effort to bring nations together in this strange new world called cyberspace.