Twitter | Search | |
The latest cybersecurity news, tips and features from the reporters and editors of . Security threats, data breaches, research and more.
Tweets 15m
An app permission flaw can put users at risk. Here's how Google addressed it.
Reply Retweet Like 1h
Google's new helps ramps up security, but most users may not like the added complexity
Reply Retweet Like 16h
Why cloud reconnaissance is crucial to a secure cloud environment
Reply Retweet Like 17h
Google is using to scan for malicious Android apps.
Reply Retweet Like 18h
An flaw could enable attackers to turn it into a listening device
Reply Retweet Like 19h
Some enterprises have their own teams. Find out the right way to build one.
Reply Retweet Like 20h
Here are some common vulnerabilities that enterprises should watch out for
Reply Retweet Like 21h
"Researchers found a vulnerability in the WPA2 protocol that could affect many Wi-Fi devices in the wild"-
Reply Retweet Like 22h
There are hidden risks within that can expose mobile users' data. Find out what these risks are.
Reply Retweet Like Oct 21
What knowledge factors qualify for true two-factor authentication? Michael Cobb of weighs in on .
Reply Retweet Like Oct 20
"As the ecosystem evolves, we continue to invest in leading-edge ideas to strengthen security."
Reply Retweet Like Oct 20
Michael Cobb of discusses knowledge factors and for mobile devices.
Reply Retweet Like Oct 20
explains how Google's increases user account security and the given trade-offs
Reply Retweet Like Oct 20
This week's Risk & Repeat podcast discusses the allegations against regarding ties to Russian government.
Reply Retweet Like Oct 20
An file editor led to a "bleed" vulnerability for Yahoo. Find out how.
Reply Retweet Like Oct 20
What are 's issues with HTTP security headers? Judith Myerson explains.
Reply Retweet Like Oct 20
bug bounty program asks testers to hunt for remote code execution vulnerabilities in top apps
Reply Retweet Like Oct 20
defense isn't necessarily stronger in the cloud. Learn more with
Reply Retweet Like Oct 20
How are shortcut files on vulnerable to attacks? Expert Judith Myerson explains
Reply Retweet Like Oct 20
Reader vulnerabilities: What can be done to mitigate them?
Reply Retweet Like