Michael Jackson's death has predictably prompted fraudsters to create malware to lure unsuspecting users.
Security vendor Symantec warns of yet another worm attack on Twitter.
Forget the Internet, the lowly trash can is a far more dangerous place for personal data.
Virtually all data loss occurs on servers. A new company releases a pubic beta for anti-malware.
Although Macs still face far fewer security problems than Windows, the trend line is going in the wrong direction.
It's well worth upgrading your version of Adobe Acrobat and Reader.
A T-Mobile spokesperson says the company is investigating the matter.
An expert at a security industry confab says that to protect your network security you must know your network really well.
As you watch a video linked to from some social network sites, hackers are installing malware on your system.
A missing hard drive with sensitive data, lost by the RAF, provides larger lessons for IT security pros.
If users click on a booby-trapped Quicktime file and perform a number of other actions, their system could be completely compromised.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?