Security | News, how-tos, features, reviews, and videos
If you should "come across" an image of sexy Russian supermodel Irina Shayk, beware. Bad Guys are using R-rated photos of Ms. Shayk to spread Mac malware.
For the first time in seven years, the average cost of a data breach in the U.S. has declined. It fell to an average of $5.5 million per data breach in 2011 despite numerous high-profile data breach incidents.
Hackers mainly targeted Russian, Eastern European and Dutch banks
Results of a new survey speak to the inadequacies of corporate security measures as well as the persistence of ever-growing security threats.
Cyber resiliency aligns the strategies, tactics, and planning of traditionally siloed disciplines for an integrated, holistic approach to cyber incident response.
Big Data is coming, but for most organizations it's three-to-five years away. That doesn't mean you shouldn't prepare now. Analyzing Big Data will require reference information like that provided by a semantic data model. And once you
The third-generation iPad will run unauthorized applications if it is modified
Law enforcement admitted filing the wrong paperwork under which they seized Kim Dotcom's property
Computer hackers could create malicious software that crosses the line from technology to biology, crafting viruses that could spread dangerous epidemics, researchers said at Black Hat Europe.
A new flaw found in Microsoft's Windows Remote Desktop Protocol (RDP) allows computers to be remotely accessed and enables an attacker to install malicious code. The bug also reportedly contains an exact copy of information Microsoft only gives
Jail-breaking a smartphone is not a secure practice
Sponsored Links