- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
Accused system administrator was claiming intellectual property rights over city's network configuration.
Twenty years of payment processing history as well as social security numbers are compromised.
Money-saving technologies will be strong, cybercriminals will rev up and business intelligence solutions will spread.
Security is never a secondary concern, but the economic situation will compound the problem.
Any time you see an e-mail with one of these subject lines, delete it without opening if you want to stay safe.
Could this be the successor to the Storm worm?
Sure, it's cool to aim at joining the Enterprise 2.0 crowd, but it opens up your business to security problems.
Making sure IT gets alerted only when there really is a problem is important.
Security logs could help detect and prevent security breaches, but analyzing their reports is so boring that they're underutilized.
New attack combines several attack techniques into a single, multi-stage attack that is still being examined for a line of defense.
More sites and businesses are hopping onto the latest tech bandwagons. You can bet that the bad guys will be, too.
Bit9 ranks the most widely used applications with known security vulnerabilities.
The economic downturn, poor cooperation among law enforcement agencies and inadequate laws may see cybercriminals prosper but not if the Obama administration takes warnings to heart.
National security think tank pushes for new U.S. oversight and regulations to combat Internet threats.
Yet many admins and senior management still feel confident in their security precautions, according to a survey from Enterprise Strategy Group.
Curious Illinois government employees find themselves in hot water.
How might Obama's appointment to head the DHS turn things around for the department? Experts weigh in.
The pair are betting that enterprises will want to leverage Windows 2008 to more tightly control and protect sensitive information.
Despite McColo's takedown, observers say that major senders of spam and malware are returning -- and may be stronger than ever.
Your cell phone becomes the second part of two-factor authentication.
Concerns grow about phone privacy violations.
TV personality is the public face of CA's updated online security software suite.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?