Ransomware: 5 Threats To Watch
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
Hacker Movies We Love & Hate
Check out Dark Reading community members' favorite hacker movie hits and misses. Then add your picks in the comments section.
9 Notorious Hackers Of 2013
This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups.
Iris Scans: Security Technology In Action
Iris-based security scans are the stuff of sci-fi movies, but NIST research shows how the technology can now be used in the real world to reliably identify individuals.
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Slide Show: 10 Password Database Fails
Evernote's most recent password breach is the same refrain from a song the industry has been singing for a while -- check out some of the worst password cache compromises
Spy Tech: 10 CIA-Backed Investments
Check out some of the latest technologies to win funding from In-Q-Tel, the venture investment arm of the CIA and other intelligence agencies. That's the first step toward use by agents and analysts.
Who Is Hacking U.S. Banks? 8 Facts
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?
14 Amazing DARPA Technologies On Tap
Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Slide Show: 10 Free Database Security Tools
While many database protection suites are an expensive proposition, there are a number of free tools available to organizations seeking cost-effective ways to begin securing their databases
Facebook's History: From Dorm To IPO Darling
Facebook's IPO brings the world's most popular social network into Wall Street's big league. After a wild ride, Facebook's future depends on profiting from an increasingly mobile user base.
Who Is Anonymous: 10 Key Facts
Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.
7 Tools To Tighten Healthcare Data Security
Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
Ten Big Breaches In 2011
No one was immune: not social networks, not financial institutions, and not even security firms
Slide Show: Sights And Sounds Of Black Hat USA 2011
Zombies, robots, 'war-flying' drones, PWN phones -- and scary, real-world SCADA hacks were among the mix of lighthearted and deadly serious demonstrations and presentations at this year's Black Hat USA in Las Vegas
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit