Current approaches to Java application protection place security at the application or the network layer, both of which are problematic. T...
I Think, Therefore IBM
IBM has announced the latest version of its neurosynaptic processor -- that is, a processor whose workings are inspired by the human brain...
Peppermint OS 5: Light, Refreshing Linux
The Peppermint OS is built around a concept that may be unique among desktop environments. It is a hybrid of traditional Linux desktop app...
Carrier Software Flaws Imperil Smartphones: Report
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this wee...
Cyberspies Help Themselves to DHS Contractor's Data
USIS, the contractor that did the background checks on Washington Navy Yard shooter Aaron Alexis and NSA leaker Edward Snowden, on Thursda...
These Are Our Favorite Startups From The DreamIt NY Demo Day
This week, we met 12 new companies that graduated from DreamIt’s NY Demo Day. We have the scoop on all of them here, from the shoppable Pint...
Russian Cybergang Stockpiles 1.2B Unique Stolen Credentials
A Russian cybercriminal gang so far has stolen 4.5 billion credentials, of which 1.2 billion appear to be unique, Hold Security has announ...