Security | News, how-tos, features, reviews, and videos
Employees who want to use their smartphones and tablets for work better be prepared to sign on IT's dotted line and essentially give away their privacy rights.
CIOs look to IT startups for competitive advantage but finding the right newbie vendor is harder than you think.
Romania's organized crime prosecutors detained 12 individuals suspected of hacking into official websites
As the White House rolls out an agenda to open and optimize government data for mobile devices and accelerate use of smartphones and tablets across departments and agencies, security expert warns that federal CIOs must address an array of vulnerabili
To reduce cyber risk, itu2019s important to invest in a combination of people, process, and technology to stay a step ahead of the bad actorsrn
Security researchers believe that a newly identified cyberespionage threat called Flame is even more complex than Stuxnet or Duqu
A nasty spambot called Cutwail is sending out porno spam in an effort to sell counterfeit pharmaceuticals. Clicking on it can turn your computer into a spam-spewing zombie.
West New York mayor Felix Roque and his son are accused of hacking into a website that promoted his recalling from office
Absitnthe 2.0 is the first untethered jailbreak available for the third-generation iPad
Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can't even do that yet, at least not legally, but it is working on it. Remember: It's not paranoia if they're actually after you.
TACK TLS extension combines public key pinning with self-generated keys to validate SSL certificates
Sponsored Links