Gene Hodges resigns to take Websense helm.
Security guru says bottom line financial considerations can make or break computer security.
Thieves are exploiting the fear of Uncle Sam's most notorious agency.
Financial institutions are getting started on security compliance regulations.
Prolific worm rears its head once again
Researchers discover new malware variant that teases with a fake Skype app.
It becomes the first state to make the scam a civil violation.
Scammers using authentic sites for dirty work.
Crackers continue to exploit American universities' computer weaknesses.
Behavior-based detection is moving up the security ladder.
A worm that spoofs Google is wending its way through the Internet via P2P networks.
Authorities track down a pilfered laptop that contained tens of thousands of students' personal data.
The company's Clean Pipes initiative helps ISPs protect its customers.
The hackers who unleashed Mytob and Zotob may be behind bars, but variants of their work continue to appear.
One of the programmers arrested in connection with the Zotob outbreak may have authored at least 20 other worms, according to an anti-virus software vendor.
A new study suggests that authentication technologies may help regain users' trust.
Versions of Zotob continue to slam corporate networks while security vendors and Microsoft play defense.
The worm and its variants are now using chat channels to allow hackers to control infected PCs.
A new generation of security appliances is aimed at making instant messaging safe to use in the enterprise.
Businesses are overlooking security risks posed by their workers' USB memory sticks, iPods and PDAs, a software maker says.
Redmond's working on the vulnerability.
The ISP will raffle off gold, cash and an SUV to members who helped bring down a spammer.
The increase in attacks has corporations on guard.
A worm packing a malicious punch is on the loose disguised as a music file making its way through the wild via AOL's Instant Messenger.
The firm adds to its security services division with iDefense buy.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?