Security | News, how-tos, features, reviews, and videos
From cybersecurity to privacy, mobile broadband to net neutrality, the coming year in Washington promises to be a busy one for the technology sector.
Distributed Denial of Service events and other cyber-attacks are an unfortunate inevitability of doing business on the Web today. The four steps presented here will help your company prepare for and respond to a DDoS attack.
To battle innovative attacks on call centers, enterprises and IT outsourcing service providers are looking to technologies like voice biometrics and behavioral analytics.
Also in this week's IT security news: Blackhole creator returns with blinged-out exploit pack; researchers bypass Microsoft fix for IE Zero Day exploit in 24 hours; European credit card crooks cash in on $2 billion a year; John McAfee continues
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
CIO.com blogger Constantine von Hoffman says a group of young panelists who spoke about online privacy at CES isn't representative of generation Y as a whole. Here's why.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
AT&T, a company that can't deliver decent customer service, says it will protect your family with home alarm systems. They've got to be kidding.
The FBI says updates to two known scams show bad guys demonstrating totally unnecessary levels of diligence and creativity. In order to see exactly how unnecessary you need only look at the agency's list of 2012's most commonly-used passwor
While the iPad has made giant strides in the enterprise, it is still hobbled because it doesn't replace laptops in many use cases because of immature tablet apps and security concerns. But the case for tablets in the enterprise will only get str
Have you checked out Facebook's new privacy shortcuts or reviewed which apps have access to your profile? Here's a look at four things you can do to better secure your profile in 2013.
Sponsored Links