- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Apr 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- Dec 2001
- Nov 2001
- Oct 2001
- Sep 2001
- Aug 2001
- Jul 2001
- Jun 2001
- May 2001
- Apr 2001
- Mar 2001
- Nov 2000
- Oct 2000
A pair of unencrypted DVDs storing names and social security numbers of current and former Charlotte, NC city employees has vanished into thin air.
A pair of phishing sites masquerading as credit unions used by military servicemen and servicewomen has been stealing personal banking information for months.
A Sophos white paper looks at the class of malware known as fake anti-virus, rogue anti-virus, or scareware.
The world's largest security software maker invested an undisclosed amount in Mocana, a San Francisco security firm that specializes in protecting connected devices beyond the PC.
Three prominent representatives ask Google for answers about the scope of its Street View operation, which mistakenly collected Internet transmissions over open Wi-Fi networks.
A new report finds that young adults are more likely than older users to restrict what they share online.
A MessageLabs white paper examines the benefits of a hosted endpoint solution.
Amid intensifying criticism, Facebook is rolling out a new set of simplified controls that CEO Mark Zuckerberg says could arrive as early as next week.
We take a hard look at five bits of wireless security conventional wisdom and tell you which are true and which are bogus.
IPS vendor re-engineers its core product to enable more rapid application awareness updates to better protect enterprise security.
It's important not to overlook disaster recovery when making plans to secure your small business's data.
A recent ITRC report finds that identity theft costs victims less than it did a year ago.
Using PC virtualization can add a layer of defense against malware and other types of security compromises to your desktop.
In his first public comments addressing the recent surge of criticism over changes to Facebook's privacy settings, Mark Zuckerberg says the company will release new controls.
For the second weekend in a row, Facebook's 400 million-plus registered users are being targeted by a malware scam disguised as a video of attractive, scantily dressed women.
A Qualys white paper offers advice on putting together an effective and affordable web application security program.
An Ofcom report states that British Internet users are becoming more aware of the importance of online security and privacy.
Governments around the world told Microsoft they need more information sooner regarding patches and other security-related incidents, and the software giant delivers.
A comprehensive Internet security report by Zscaler found that Web servers hosted in South America harbored a much higher ratio of malware-infected servers than other regions.
Whether you need a free solution or have a budget to spend, whole disk encryption is a must-have. We lay out a few good alternatives.
As the administration continues its efforts to overhaul the federal government's approach to cybersecurity, agencies are launching an online portal asking for research proposals.
An in-depth look at CACE Pilot ($1295), which cuts large-volume traffic captures down to size through visualization, drill-down, reporting, and more.
A Sophos white paper offers guidance on finding the right balance between data security and easy access to information.
Microsoft says it's working on a patch for a security vulnerability discovered in some 64-bit versions of Windows and Windows Server, but downplays the risk of system takeovers.
The popular ABC drama is in its final season and hackers are preying on viewers' interest to spread all sorts of malware.
Mix-and-match open source substitutes for commercial security software with this list of popular commercial apps and their open source counterparts.
If you don't encrypt your database, a hacker could steal all the passwords and usernames stored there. Safeguard your data using the encryption techniques that PHP offers.
A Global Knowledge white paper looks at the 10 policies that every organization should implement.
Verizon Business says SaaS will make it easier and cheaper for enterprise customers to log into corporate networks, share data from mobile devices and more.
A new (ISC)2 report examines federal CISOs' perspective on the cyber security of national assets.
Under pressure from German data-collection authorities, search giant confesses that its Street View cars have been inadvertently collecting unsecured network information.
Experts wonder, is there an undeclared war raging in cyberspace? And if so, whose job is it to fight it?
Nearly 10,000 citizens enrolled in New Mexico's Medicaid Salud plan had their social security numbers and other personal data exposed after an unsecured laptop was stolen.
A Qualys white paper examines the increasing challenges enterprises face in protecting sensitive data.
U.S. defense official admits that United States is losing massive amounts of data to cyber attacks.
The social networking site has joined the likes of Bank of America, PayPal and the IRS as the one of the most popular Web sites targeted by phishers.
Leading social network Facebook is taking steps to improve authentication by blocking suspicious logins and providing users with enhanced notifications.
Learn how to simplify your IBM DB2 Database Security Setup using DB2 ROLEs.
A study by CA and the Ponemon Institute examines IT professionals' key cloud security concerns.
Effort to identify at-risk plugins moves beyond Firefox to include Internet Explorer and other browsers, but does it work?
The world's biggest social network is calling an all-hands company meeting to discuss its growing image problem over its approach to privacy.
Global software piracy continued virtually unabated in 2009, costing software developers an estimated $51 billion, according to a survey by the Business Software Alliance.
According to the Anti-Phishing Working Group, one cyber gang known as Avalanche was responsible for two-thirds of all phishing attacks in the second half of 2009.
A Qualys white paper offers guidance on justifying and allocating an information security budget.
The new BSIMM2 provides the data-driven measurements that allow organizations to objectively assess their software security maturity level against their peers and themselves.
Researchers at Matousec are warning that a kernel-level attack can be used by hackers to bypass leading security software applications for Windows-based PCs and devices.
When shopping for secure removable storage devices, such as flash drives or portable hard drives, there are several key points to consider.
What tends to scare people away from putting their data in the cloud are worries about security. Are private clouds the answer?
A survey by MeriTalk and Axway finds that 54 percent of respondents do not currently monitor for FTP use within their agencies.
Microsoft releases two 'critical' patches for Windows and Office in May's Patch Tuesday drop, making things a little easier for IT administrators compared to last month.
Enhance network security by finding your WLAN's vulnerabilities before attackers do--and without spending a bundle.
An Imprivata white paper looks at the challenges that healthcare organizations face in protecting private data.
Gadget site uncovers simple way to force other users to follow you, even big movie and TV stars, but Twitter staffers rush out a fix to the weakness in the system.
Online scamsters are using Apple's brand as a lure to get people to divulge their personal information and plunder their gift cards.
Our colleagues at IT Business Edge speak with Scott Waddell, vice president of technology at iovation, about fraud prevention and risk mitigation.
Instant messaging fans using Yahoo Messenger have been infected by a worm that's disguised as a photo link from a member of a user's contact list.
Microsoft rolls out two new products for protecting customers' enterprise data through the use of multiple malware engines on SharePoint collaboration servers.
Faster network infrastructure pushes more virtualized services into the cloud, reshaping security risks and strategies.
A WhiteHat Security report looks at web site security with a focus on the security of specific programming languages.
May's "Patch Tuesday" drop will be relatively painless, with only two "critical" patches to deal with. But why isn't last week's SharePoint flaw being addressed?
A CA white paper suggests eight key considerations for effective data loss prevention.
Whether or not corporate policy allows it, workers still bring smartphones to the office. Here, seven steps for managing personal mobile devices in an enterprise environment.
Data Breach Investigations Report will combine U.S. Secret Service information with telecom's investigations to provide a thorough review of cybercrime tactics and responses.
One of the best ways to prevent data theft and improve information security is to encrypt your data. Don't worry--it's easy!
After more than a year of hearings and meetings, Reps. Rick Boucher and Cliff Stearns debut draft privacy legislation that would set parameters for online marketers.
Charged with improving Internet and software security, Microsoft's Scott Charney makes recommendations about how to better protect PCs and track down cyber criminals worldwide.
A flash drive storing patient names, birth dates, admission and discharge dates, as well as insurance information has gone missing from a Kentucky psychiatric hospital.
New inline threat-prevention appliance incorporates integrated Malware-VM and Malware-Callback filters to inoculate networks.
A Prism Microsystem study finds that companies are more eager to deploy virtualization than they are ready to address the security issues surrounding such deployments.
Perhaps because of security concerns, use of Microsoft's Internet Explorer browser has continued to drop worldwide.
A Sophos white paper looks at the steps required to implement an effective data loss prevention strategy.
Enterprises need tools now to deal with mobile devices along with enforceable means to prevent truly sensitive data from flowing to handhelds, says Sonny Discini.
Imation's Defender collection of storage devices meets international standards for encryption, including FIPS 140-2 (Levels 1 or 3, depending on device type).
A BSA survey has found that 60 percent of US citizens don't even know what 'in the cloud' means.
An international study highlights a weakness of business and government cybersecurity: the absence of strong communication between public and private sectors.
When it comes to securing your e-mail, particularly when traveling, constant vigilance is vital. Learn tips for protecting sensitive communication at home or abroad.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?