Security | News, how-tos, features, reviews, and videos
This week's IT security news roundup features stories on an online video-game service that was hacked; the newly discovered Gauss malware; spyware designed for use by law enforcement showing up where it shouldn't; and more.
The U.S. Army's flushes $2B down the drain on a mobile intelligence database; the American State Department fights terrorists by trolling them online; and a website offers a 9mm pistol as reward for finding the hacker who put naughty pictures on
Recently discovered mobile-Zeus-Trojans suggest malware creators are targeting BlackBerry smartphone users outside of North America, despite RIM’s struggles in the United States.
As Facebook forces Timeline onto users who have held out, here's a refresher on important privacy and account settings to change.
Whether it’s a natural disaster, a hardware failure, or a cyberattack, IT leaders face myriad challenges when it comes to managing and mitigating IT risks.
Some of the indispensable technology that you use every day was so ahead of its time that it now goes largely unnoticed. Here the innovations that forever changed email, Web development, database management and other "givens" in today'
The cloud offers a number of benefits to online users, but it's also riddled with risks. A Wired reporter's recent experience should serve as a cautionary tale for all individuals and companies that are embracing the cloud.
BlackBerry-maker RIM released a statement last week to refute recent reports that suggest the company granted access to encrypted corporate data to the Indian government. RIM has repeatedly stated that it simply cannot grant such access, but some med
In a world where iPads and Android devices are the rage, Seton Hall University bucked the BYOD trend and opted for Windows 8 tablets and ultrabooks for students and faculty, even though the OS doesn't ship officially until October. Why did the u
Porn makers are accusing people of illegally downloading their sleazy content. They'll tell you that you're responsible even if someone else is doing it using your Wi-Fi network. But it's not true.
Sponsored Links