Data breaches are on the rise, but cybersecurity experts say employees and companies can still make broad changes to cut back on hacks.
The world's largest social network extends the capabilities of its search feature from desktop computers to mobile devices. But will it make a difference?
Ending the NSA's massive phone database is just one recommendation in a report from the White House's surveillance review panel.
The hard-to-detect malware is a Swiss Army knife of clandestine tools to extract information from targets in non-English speaking countries, experts say.
Regin's behavior suggests that the newly uncovered and "highly complex" spying threat came from a nation-state, Symantec reports.
The USA Freedom Act, blocked by the Senate, would have curbed powers granted under the Patriot Act, including bulk collection of Americans' phone records.
The database contains stolen usernames and passwords associated with Facebook, Twitter, Google, Yahoo, and more.
After users' hashed passwords, e-mail addresses, and other information is exposed in a security breach, the cloud-based hosting service neutralizes the attack and works to prevent future incidents.
The country's new SLIX network will allow rapid transmission of data between researchers -- and let students in partner universities enjoy super-fast Internet speeds.
Investigation into attack on JPMorgan Chase may have expanded to seven of the world's top banks, amid a report that hackers altered records.