Narrow your search
Cloud computing and Infosec blogger, Chris Hoff, notes that the adoption of the iPhone has much in common with the adoption of cloud computing. Fans are willing to live with incomplete feature sets in order to benefit from a new way of doing things.
Experts gathering to discuss intellectual-property theft say that a fix will require the application of economic sanctions, not just more technology.
Only half of one of the security holes previously identified on the government's health care site has been patched, while new ones have since been uncovered, says the head of a security consulting firm.
The good ol' days of chummy games of "Spot the Fed" at Defcon are finished as hackers and security entrepreneurs plan next steps in the wake of government spying revelations.
Security researchers say that the danger stems from widely used technology found in routers and other standard networking equipment.
Hackers for Charity founder Johnny Long hopes computer and security skills can break the cycle of poverty and keep Uganda from becoming another Nigeria.
Jeff Moss will oversee security at ICANN while also running the Defcon and Black Hat conferences and serving on the Department of Homeland Security advisory council.
Internet crooks are adept at breaching Web security techniques, which makes it more important than ever for people to verify sites before they visit them.
Various people hiding behind pseudonyms are fueling news about a supposed worm for Mac OS X.
This year's hacker show has something for everyone, from hardware hacking and zero-day contests to con games and nerd-core rappers. Plus: Black Hat ropes in Apple to talk iOS security.