Educating consumers presents issues, but with business, government, and individuals all working together, panelists were optimistic about our cyber security future.
Computer security experts warn of the dangers in virtualization.
Trojan.Peskyspy defeats Skype encryption by exploiting a Windows API. The vulnerability's level of danger is unclear.
It's a well known fact that employees can pose some of the most troublesome security challenges for companies.
A common ploy uses spam promising a good deal on an automobile.
Even more than the growing threat from malware-infested social media, e-mail security is causing big headaches at many businesses.
The level of contagion from a global cyber war could be impossible to control, experts say.
Security experts discuss how today's mobile usage and social networks pose a major challenge to IT security.
While the actual video of ESPN anchor Erin Andrews does reportedly exist, hackers are using fake copies to spread malware across the Web.
Intel's director of security recommends that company start small with their virtualization efforts to ensure greater security.
Prosecutors allege that an employee worked in concert with the Bonanno crime family.
A blown cover for a major intelligence figure in Britain demonstrates the dangers of Facebook.
Michael Jackson's death has predictably prompted fraudsters to create malware to lure unsuspecting users.
Security vendor Symantec warns of yet another worm attack on Twitter.
Forget the Internet, the lowly trash can is a far more dangerous place for personal data.
Virtually all data loss occurs on servers. A new company releases a pubic beta for anti-malware.
Although Macs still face far fewer security problems than Windows, the trend line is going in the wrong direction.
It's well worth upgrading your version of Adobe Acrobat and Reader.
A T-Mobile spokesperson says the company is investigating the matter.
An expert at a security industry confab says that to protect your network security you must know your network really well.
As you watch a video linked to from some social network sites, hackers are installing malware on your system.
A missing hard drive with sensitive data, lost by the RAF, provides larger lessons for IT security pros.
If users click on a booby-trapped Quicktime file and perform a number of other actions, their system could be completely compromised.
The percentage of email that's spam has risen to a choking 90 percent, according to MessageLabs.
Never lacking for invention, spammers have begun leveraging fake ads for a health food drink.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?