If a hacker can get a Windows user to click on a bad link in an email or on a website, it can essentially hijack communications and steal sensitive information.
There's ample advice out there telling chief information officers how to build a breach recovery plan, but the key steps to avoiding such an event are not as clear.
Top-secret documents suggest U.S. government researchers created a version of Apple's application development tool to create surveillance backdoors into programs distributed on the App Store.
The search giant retires its annual hackathon, replaces it with an around-the-clock program that allows hackers to submit (and get paid for) finding bugs anytime, from anywhere.