Security | News, how-tos, features, reviews, and videos
The free Android Mobile Security Advisor app from Athigo aims to help educate users to potential security threats and identify Android owners who may be at risk. And the company used security tips from CIO.com's Al Sacco as the basis for one of
LinkedIn's social ads, which automatically opt you in, may use your name and photo to promote brands that you follow. Here are step-by-step instructions for how you can opt-out.
A lack of honest information-sharing between public and private sectors and among nations hampers cyber defenses, warns a new report by McAfee and the Brussels-based Security and Defense Agenda.
McAfee has been warning users that the Android Market is prone to attack. Now it's happened, and McAfee has launched an upgraded application to defend your phone.
If hackers gain access to a service providersu2019 systems, they can likely get to your systems, too. Rest assured, there are steps you can take to keep your cyber risk to a minimum.rn
In the borderless digital world, tech and finance companies can get tangled up in a web of laws and regulations on privacy and data security.
Small USB flash drives can cause big security headaches. Learn how four very different organizations have managed to balance the need to allow employees to transfer files for legitimate business purposes with the need to prevent data leaks.n
One in five information workers now uses an Apple product for work, says Forrester. Is Microsoft's dominance at an end? One thing is for certain: CIOs must deal with the Apple impact.
Users have a right to be upset when a major security company admits that it has been hacked, but then issues confusing and contradictory warnings.rnrn
On the heels of high-profile settlements with Google and Facebook, the Federal Trade Commission's Julie Brill signals that lower-profile members of data economy can expect heightened scrutiny.
When hackers attack a company's systems and steal your personal data, what risk does that pose to you and other victims? How much is your name and email address worth to cybercriminals anyway? To find out what's really at stake, CIO.com ask
Sponsored Links