Security | News, how-tos, features, reviews, and videos
When it comes to technology dependency and risk of legal compliance, the cloud is just like everything else
One opponent has expressed worries that the bill would create a 'Wild West of information sharing'
Glenn Mangham of York, England, said he meant no harm and hoped Facebook would let him off the hook
Symantec and VMware source-code breaches led to the companies assuring customers the leaks posed no threat. But what's the reality?
Trustworthy Internet Movement say 75 percent of HTTPS websites from Alexa's top one million are vulnerable to the BEAST SSL attack
Although Macs are more likely to carry Windows malware than Mac malware, Mac users need to keep their systems clean
VMware ESX source code from 2003 and 2004 has been stolen and posted online
Google gets praise from VRP hall of famers -- but could learn a lesson or two from Mozilla
All cases of Conficker infection stemmed from just two attack methods: weak or stolen passwords and exploiting software vulnerabilities for which updates existed
As Congress prepares to debate yet another cyber security bill, here's a quick look at the basics of the cyber-based threats to every IT system