Security | News, how-tos, features, reviews, and videos
Instead of worrying about the security threat posed by Java, simply get rid of it. Chances are you won’t miss it. Here are steps you can take to kill Java from your PC.
Facebook today announced a new search capability--currently in beta--called Graph Search. Here's how your Facebook privacy settings will affect what others can find.
Kaspersky Labs says new "Red October" malware is as sophisticated as Flame, and it may have been created by criminals—not a nation or country.
From cybersecurity to privacy, mobile broadband to net neutrality, the coming year in Washington promises to be a busy one for the technology sector.
It’s on everyone’s mind: How will AI benefit threat actors?
Distributed Denial of Service events and other cyber-attacks are an unfortunate inevitability of doing business on the Web today. The four steps presented here will help your company prepare for and respond to a DDoS attack.
To battle innovative attacks on call centers, enterprises and IT outsourcing service providers are looking to technologies like voice biometrics and behavioral analytics.
Also in this week's IT security news: Blackhole creator returns with blinged-out exploit pack; researchers bypass Microsoft fix for IE Zero Day exploit in 24 hours; European credit card crooks cash in on $2 billion a year; John McAfee continues
CIO.com blogger Constantine von Hoffman says a group of young panelists who spoke about online privacy at CES isn't representative of generation Y as a whole. Here's why.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
AT&T, a company that can't deliver decent customer service, says it will protect your family with home alarm systems. They've got to be kidding.
Sponsored Links