How Microsoft Handles BYOD

While BYOD still worries infosec pros, vendors like Microsoft are easing concerns by offering authentication and management capabilities.

The "Bring Your Own Device" (BYOD) phenomenon has picked up quite a bit of steam over the last year, matching the uptick in tablet ownership and usage patterns. Tablets have graduated from personal content … more »

Google Project Zero Focuses on Internet Security

Months after reporting its first vulnerabilities, Google officially acknowledges the existence of a shadowy security group known as Project Zero.

Are TrueCrypt Users Screwed?

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

How to Reduce Use-After-Free Memory Risk

Use-after-free memory errors often crop up in software application code.

Boleto Malware Hits Brazil Payment System

New IBM Trusteer research finds new variants of malware used to exploit Brazil's Boleto payment system.

User Education Key in Fighting Mobile Malware

Train users to read and heed mobile application permissions, says McAfee Labs.

Fighting Advanced Persistent Threats with Emulation

A layered approach to security is the key to fighting advanced persistent threats (APTs).