Security | News, how-tos, features, reviews, and videos
FraudMAP Mobile looks at the behavior of users to determine possible fraudulent activity
Three media-handling libraries were updated and three native vulnerabilities were fixed in WordPress 3.3.2
Bit9 survey shows that many IT professionals believe hacktivists are likely to target their organizations
Groups using the server said there's little chance the FBI will be able to trace email sent by the machine
If hackers gain access to a service providersu2019 systems, they can likely get to your systems, too. Rest assured, there are steps you can take to keep your cyber risk to a minimum.rn
The Northern Star Council Boy Scouts of America believes a bring-your-own-device approach and a cloud-based virtual private network service are the right tools to explore iPads in the enterprise.
Researchers design an app that analyzes subtle smartphone movements to infer what's being typed on touchscreens
This week's cybersecurity roundup features stories on the Cyber Intelligence Sharing and Protection Act (CISPA); a new Android Trojan that hides inside the popular Instagram photo-sharing app; Javascript-related malware that could have infected
Nottingham University Hospital's night staff was handicapped with archaic technology for assigning physician tasks and organizing patient information until an investment in Cisco Cius tablets and a third-party workflow app provided the remedy.
Leading trade associations back the Cyber Intelligence Sharing and Protection Act ahead of next week's floor debate. However, privacy advocates continue to object to the controversial information-sharing bill.
The sites could be infected with JavaScript redirect malware and servers could be compromised, Google warned
Sponsored Links