Security | News, how-tos, features, reviews, and videos
Cybercriminals are increasingly using drive-by downloads to distribute malware without end users knowing something bad has just landed on their machine--until it's too late. Here are six ways IT departments can protect end users from the product
From privacy settings to customization and more, here are six tips to set you on the right path with Facebook Timeline.
Technology industry representatives -- looking to prevent an additional set of compliance requirements -- urge House subcommittee to avoid new cybersecurity regulations to shore up the nation's digital defenses.
Exchange offers lessons -- and reads like something out of a movie
M&A transactions must ensure adequate cyber security before closing the deal, or risk negative impact on valuation.rn
Between the free-expression camp and the hard-line regimes with strict censorship policies are a host of important, growing nations that are just beginning to delve into the work of crafting Internet policy. And those countries could hold the key.
Motorola recently shipped about 100 refurbished XOOM Wi-Fi-only tablets that is says may contain sensitive information belonging to the original tablet owners. But the news would be a non-issue if those owners had simply performed a good ol' sec
Bringing the intelligence and efficiency of the TSA to your company. Yikes.
IT professionals know that handing data over to a third-party is always risky, but cloud computing creates unique concerns for IP. Here are nine tips to protect critical corporate data wherever it goes
Few think of formal risk management in terms of incorrect data entry. They should.
Symantec recants its scary Android malware warning, as Google's new app security system, called Bouncer, makes the Android Marketplace more secure. Do security companies hype their warnings?
Sponsored Links