Security | News, how-tos, features, reviews, and videos
From privacy settings to customization and more, here are six tips to set you on the right path with Facebook Timeline.
Technology industry representatives -- looking to prevent an additional set of compliance requirements -- urge House subcommittee to avoid new cybersecurity regulations to shore up the nation's digital defenses.
Exchange offers lessons -- and reads like something out of a movie
Between the free-expression camp and the hard-line regimes with strict censorship policies are a host of important, growing nations that are just beginning to delve into the work of crafting Internet policy. And those countries could hold the key.
If you must ask, the answer is probably u201cnou201d
Motorola recently shipped about 100 refurbished XOOM Wi-Fi-only tablets that is says may contain sensitive information belonging to the original tablet owners. But the news would be a non-issue if those owners had simply performed a good ol' sec
Bringing the intelligence and efficiency of the TSA to your company. Yikes.
IT professionals know that handing data over to a third-party is always risky, but cloud computing creates unique concerns for IP. Here are nine tips to protect critical corporate data wherever it goes
Few think of formal risk management in terms of incorrect data entry. They should.
Symantec recants its scary Android malware warning, as Google's new app security system, called Bouncer, makes the Android Marketplace more secure. Do security companies hype their warnings?
Google starts checking apps for malware; new trojan diverts calls from banks to criminals
Sponsored Links