Security | News, how-tos, features, reviews, and videos
Also in this week's IT security news: Blackhole creator returns with blinged-out exploit pack; researchers bypass Microsoft fix for IE Zero Day exploit in 24 hours; European credit card crooks cash in on $2 billion a year; John McAfee continues
CIO.com blogger Constantine von Hoffman says a group of young panelists who spoke about online privacy at CES isn't representative of generation Y as a whole. Here's why.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
AT&T, a company that can't deliver decent customer service, says it will protect your family with home alarm systems. They've got to be kidding.
As organizations grapple with new cybersecurity challenges, the need for an efficient, effective, modern-day SOC is imperative.
The FBI says updates to two known scams show bad guys demonstrating totally unnecessary levels of diligence and creativity. In order to see exactly how unnecessary you need only look at the agency's list of 2012's most commonly-used passwor
While the iPad has made giant strides in the enterprise, it is still hobbled because it doesn't replace laptops in many use cases because of immature tablet apps and security concerns. But the case for tablets in the enterprise will only get str
Have you checked out Facebook's new privacy shortcuts or reviewed which apps have access to your profile? Here's a look at four things you can do to better secure your profile in 2013.
This week's IT security news roundup has stories on colleges offering free online-reputation management tools to students; a secret NSA computer test; hospital data-breach statistics; a Chrome-browser clickjacking vulnerability; and more.
A recent New York Times report suggests antivirus programs are useless because they don't always detect new threats. But the report is misleading because it overlooks the fact that antivirus software can detect older threats that are just as dan
To make more efficient use of data and improve data protection, take a holistic approach to information governanceu2014one that focuses attention on the most sensitive data while removing impediments to sharing.
Sponsored Links