Security | News, how-tos, features, reviews, and videos
An attacker could potentially decrypt information secured with an older version of FileVault, Apple's encryption technology
This week's cybersecurity roundup has Mozilla becoming the first major Internet company to publicly oppose the Cyber Intelligence Sharing and Protection Act (CISPA); new Android malware; and a trojan that uses the U.S. DoJ name to extort cash fr
A new cybersecurity report from Symantec offers an interesting look at 2011's significant Internet-security threats and trends, including a new focus for hackers, mobile attacks and the effects of major data breaches.
New survey from TechAmerica reveals the mounting pressure facing agency CIOs to do more with less, as budget cuts imperil new initiatives such as cloud computing and data-center consolidation.
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
TrustSphere looks at the relationship between senders, which can be a better indication of whether a message is spam or not
The hackers call their a!150,000 demand an "idiot tax" because the information was unencrypted on the bank's web server
The group has been on a weeks-long hacking binge, hitting the U.S. Air Force website and others
In a recent study,IBM concluded that successful security organizations tend to have common characteristics, including a dedicated chief security officer with strategic vision and the ear of business leaders.
Lookout Mobile Security has spotted the first malware to automatically load itself onto Android devices via hacked websites
The teenager is freed on the condition that he does not use the Internet at all
Sponsored Links