With security information limited by screen size, even experts can't tell when they're visiting malicious sites, according to a Georgia Tech study.
RIM's long-awaited BlackBerry 10 OS contains a blacklist of passwords that users will not be allowed to use. Maybe it's not a great idea, but it's a good one.
Browsers are getting better at blocking phishing sites, but phishers are getting more nimble at keeping their sites on the move.
Despite the growing number of malicious apps for Android devices, researchers at Georgia Tech found a surprisingly low rate of infections on phones in the United States.
DOD wants a baseline of security standards for defending civilian critical infrastructure and clear lines of authority for sharing information across sector boundaries.
A lack of attention from developers and users to the security of mobile applications has troubling implications for those who would bring mobile devices into the workplace.
The EastWest Institute is holding its third cybersecurity summit in India next week, part of an effort to bring nations together in this strange new world called cyberspace.
With the growing use of electronics in voting systems, the security of network connections are increasingly important, and sometimes overlooked.
The nation's cybersecurity is still hampered by inadequate cooperation between the public and private sectors; legislation could help solve that problem.
The recent exploit of open redirect in some shortened .gov Web addresses underscores the importance of server configuration to guard against easily prevented problems.