Security | News, how-tos, features, reviews, and videos
As enterprises move toward Web services, new focus is placed on the identity of things
To better facilitate transactions involving multiple parties, the industry proposes machine-to-machine exchange of identity data. But can you automate trust?
Agreeing on standards for sharing identity is hard enough without having to reconcile privacy laws around the world
At the very least, spyware can make your computers less efficient -- but it could be a lot worse
Oracle patches plug several vulnerabilities reported last month
Republicans outline technology goals
Sender ID technology may not be effective at stopping spam, CipherTrust survey finds
President of Jolly Technology refused to give police a formal complaint
Lawmakers are preparing to attack spyware, but efforts could criminalize common tools and techniques currently in use
JEDI group takes saber to security issues