Endpoint Protection | News, how-tos, features, reviews, and videos
Explore related topics
Intel does more than manage user devices: It embraces and actively invites them in
Conspiracy theories aside, Huawei appears to be only just catching up on the importance of security, a researcher says
The amount of application vulnerabilities had been declining since 2009
New research papers on next-generation Windows 8 and Mac OS X rootkits suggest a new wave of vulnerabilities. But most users are going to be more secure, not less
Bromium's VSentry software protects PCs by isolating each task on a microVM and then discarding it
Security researchers believe a new variant of the sophisticated TDL4 bootkit affected over 250,000 victims in the past few months
HP bolsters security wares in attempt to address enterprise concerns
Developer creates tool to easily decrypt the keychain data of local Mac OS X users from the root account
Changes come to VMware's vShield security approach, both in terms of functionality and naming conventions
Security researchers propose methods to protect computers from being compromised via a new vulnerability in all versions of Java Runtime Environment 7