In a second major update, Google's week-old social service gets another makeover in response to user concerns over privacy.
ISPs spring into action after a mainstream publication fingers a U.S. Web hosting company for its role in the global spam and malware epidemic.
Biometric authentication meets encrypted, USB keychain-based enterprise instant messaging.
UPDATE: FaceTime launches 'challenge-response' for IM. Is it too aggressive?
The IM giant temporarily knocks off unauthorized third-party users and patches a vulnerability, while exploring new add-ons to its client.
Following the latest public instant messaging security woe, Redmond cautions continued vigilance.
The public IM giant issues a patch to correct a potential ActiveX vulnerability.
The firm acquires Principle's IMtegrity -- and prepares to go head-to-head with established players in enterprise instant messaging logging.
NetBIOS continues to pose spam and virus threats -- prompting the two giants to both adopt new policies.
A new study from Symantec highlights the need for instant messaging security solutions in the enterprise.
The company offers an instant messaging gateway for small businesses, and plans an enterprise offering as part of its Integrity offerings.
After a series of embarrassing Windows vulnerabilities, Redmond moves to safeguard its consumer instant messaging clients -- spotlighting one of the chief risks associated with free, public IM.
A look at Validian's enterprise instant messaging system, which hinges on authentication tied into a USB fob.
A look at Userplane's encrypted, Flash-based multimedia instant messaging client.
The dark side of instant messaging bots.
New offerings add content filtering and LDAP-based user privileges provisioning.
The growing interest in enterprise-level instant messaging systems means good things for vendors -- but also has serious ramifications for workplace privacy.
As the company and its customers investigate how spammers may have gotten e-mail addresses, mailers continue wrangling with larger issues.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?