Security | News, how-tos, features, reviews, and videos
Businesses have a lot of control over cloud-stored data, but many don't know how to use it
The Electronic Privacy Information Center has requested the investigation
Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database
The latest technologies include quantum computing, gamification, reactive programming, augmented reality, and others
Google said the change will prevent security researchers from holding onto dangerous bugs in order to claim a big prize
Users of the mobile management platform will now be able to access enterprise apps with Apple's Touch ID
Microsoft's confusing mix of file-access methods will confound users and make document management iffy
There's only thing worse than Lenovo not knowing about Superfish: Lenovo knowing about Superfish
A class-action lawsuit charged Lenovo and Superfish of fraudulent business practices, making PCs vulnerable