Security | News, how-tos, features, reviews, and videos
If you should "come across" an image of sexy Russian supermodel Irina Shayk, beware. Bad Guys are using R-rated photos of Ms. Shayk to spread Mac malware.
For the first time in seven years, the average cost of a data breach in the U.S. has declined. It fell to an average of $5.5 million per data breach in 2011 despite numerous high-profile data breach incidents.
Hackers mainly targeted Russian, Eastern European and Dutch banks
Results of a new survey speak to the inadequacies of corporate security measures as well as the persistence of ever-growing security threats.
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
Big Data is coming, but for most organizations it's three-to-five years away. That doesn't mean you shouldn't prepare now. Analyzing Big Data will require reference information like that provided by a semantic data model. And once you
The third-generation iPad will run unauthorized applications if it is modified
Law enforcement admitted filing the wrong paperwork under which they seized Kim Dotcom's property
Computer hackers could create malicious software that crosses the line from technology to biology, crafting viruses that could spread dangerous epidemics, researchers said at Black Hat Europe.
A new flaw found in Microsoft's Windows Remote Desktop Protocol (RDP) allows computers to be remotely accessed and enables an attacker to install malicious code. The bug also reportedly contains an exact copy of information Microsoft only gives
Sponsored Links