Graph Search makes it easier for cyber criminals to gather relevant details that can be used to target phishing attacks more effectively
Mobile worms that buy malware from app stores, ransomware
What can you do if your antivirus software (in this case Norton) identifies a program as a Trojan, but you're pretty sure it's not?
The iLivid installation routine put several unwanted programs on Threaddy's computer. Why didn't Norton block the program as malware?
Security built in at the level of microprocessors is finally starting to look like a viable layer of defence
There is a war to prepare for - a cyberwar. Sun Tzu's Art of War offers much guidance
Hardware giant sets its sights on systems management, security software and business intelligence
Gartner says cloud SLAs are 'weak but improving' - but just how effective are those controls?
The hacker gained admin access to all critical DigiNotar certificate authority systems despite network segmentation, investigators say
Security experts say Windows 8 is the most secure Microsoft OS to date, but that doesn't mean malware won't evolve to exploit it
Is it all a lot of hype or will Kaspersky's dream become a reality?
Despite great strides being made with embedded security, the end user remains the week link
DDoS attacks are crude but effective
Least privilege management has still not gone mainstream
From Wi-Fi to mobile security, here are 11 things you should commit to doing this year to keep hackers and malware at bay.
How Windows 8 Professional and Enterprise users should encrypt their external drives—for free.
The first problem that we lawyers have when we hear "data" and "cloud" used in the same sentence is that data is valuable, and the cloud concentrates that value
The relevant technologies and tools are available to enable your staff to do their jobs without compromising corporate data
At Palo Alto Networks conference, one security expert explains why
Taking a proactive approach to fraud detection can help firms protect their money and reputation
There are unique differences and threats specific to each smartphone - so which is the best?
Breach prevention is dead.
US national security doesn't like the word "BYOD" and are mostly BlackBerry users still
IT managers should move into a position of understanding the natural state of their IT environment
Education and contracts with employees can help curb security risks