Security | News, how-tos, features, reviews, and videos
Google has discovered it can identify computers infected with some malware by the proxies used to handle search requests
The more virtualized your systems are, the more you need to re-evaluate your security
RPost has asked for an injunction against Adobe, which would render Adobe's purchase of EchoSign worthless
First bounty posted since 2009, when Microsoft offered cash for Conficker's makers
Your Anon News announces it will create its own social networking site and warns of an 'operation' being organized against Google+
Vivek Kundra, in appearance before White House science committee, also tells of the risk of data sharing
Unsanctioned devices, compromised networks, downtime -- today's IT is all about embracing imperfections
Judging by reader feedback on last week's post, most people think it's a terrible idea to make companies liable for bad code. Here's why they're wrong
The flaw could allow an attacker to reset a Skype user's password and take control of their account
U.S. Department of Defense's Strategy for Operating in Cyberspace includes an initiative for treating cyber space as a domain like land and sea