Microsoft and its partners in law enforcement aim to disrupt the ZeroAccess botnet, one of the most robust botnets in operation today.
Working in partnership with the FBI and Europol, Microsoft has taken aim at the ZeroAccess botnet that has been impacting Internet search engines. Microsoft claims that approximately $2.7 million a month … more »
The key to securing the Internet of Things could be in making sure that everything isn't actually connected to the Internet.
Despite the risks of not making security policies central to enterprise BYOD and mobility programs, many organizations are ignoring this best practice.
Hackers like the Syrian Electronic Army are finding weaknesses to exploit in the Domain Name System. Here's how to keep your organization from falling victim to a DNS attack.
Video: Ben Golub, CEO of Docker, explains how Linux container technology presents a very different model for virtual security.
Biometrics promised to bring security to everything from transactions to systems usage. Yet biometrics never saw broad adoption. Can biometrics finally go mainstream?
The researcher once known as Rain Forrest Puppy explains how he discovered the first SQL injection more than 15 years ago.
As an annual contest shows, social engineering can be an effective way for hackers to obtain sensitive data. Training is one of the best ways to fight social engineering.