Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.
Uber is dismissing allegations that it stole trade secrets from rival Waymo, calling them “a baseless attempt to slow down a competitor.”
The road to develop self-driving cars might be paved with lawsuits. Waymo, a spin-off from Google's self-driving car initiative, is suing Uber for allegedly stealing its trade secrets.
If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity.
The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.
Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before U.S. Congress, warning it about the dangers of the internet.
Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more.
The cybersecurity industry has been talking up artificial intelligence and machine learning as a way to stop the hackers, but don’t necessarily believe all the hype.
Businesses targeted in email phishing schemes don’t always have to play the victim. They can actually fight back.
How should the U.S. respond to cyber attacks? That’s been a major question at this year’s RSA security conference, following Russia’s suspected attempt to influence last year’s election.
Hackers have probably had a harder time slipping past your security software, thanks to an alliance between some of the top vendors in the industry.
A security researcher is showing that it’s not hard to hold industrial control systems for ransom. He's experimented with a simulated water treatment system based on actual programmable logic controllers (PLCs) and documented how these can be hacked.
Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.
Privacy advocates are claiming in court that an FBI hacking operation to take down a child pornography site was unconstitutional and violated international law.
Apple’s iCloud appears to have been holding on to users’ deleted internet browsing histories, including records over a year old.