Security | News, how-tos, features, reviews, and videos
Rogue copies of Green Simurgh, an Internet proxy software application used in Iran and Syria, have been found to contain malware that records users' activities and keystrokes.
Employees who want to use their smartphones and tablets for work better be prepared to sign on IT's dotted line and essentially give away their privacy rights.
CIOs look to IT startups for competitive advantage but finding the right newbie vendor is harder than you think.
Romania's organized crime prosecutors detained 12 individuals suspected of hacking into official websites
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
As the White House rolls out an agenda to open and optimize government data for mobile devices and accelerate use of smartphones and tablets across departments and agencies, security expert warns that federal CIOs must address an array of vulnerabili
Security researchers believe that a newly identified cyberespionage threat called Flame is even more complex than Stuxnet or Duqu
A nasty spambot called Cutwail is sending out porno spam in an effort to sell counterfeit pharmaceuticals. Clicking on it can turn your computer into a spam-spewing zombie.
West New York mayor Felix Roque and his son are accused of hacking into a website that promoted his recalling from office
Absitnthe 2.0 is the first untethered jailbreak available for the third-generation iPad
Malware exists that lets Bad Guys hijack webcams and microphones. The U.S. government can't even do that yet, at least not legally, but it is working on it. Remember: It's not paranoia if they're actually after you.
Sponsored Links