Security | News, how-tos, features, reviews, and videos
Experiment is meant to demonstrate the dangers of social networking apps and the ease with which they can be used for spam or to steal personal data
FCC had voted to prohibit Comcast from slowing BitTorrent p-to-p traffic, saying traffic throttling violated net neutrality principles
Security researchers have already uncovered vulnerabilities in Google's Chrome browser, including one that could allow a user to download malicious code
Critics suggested language in EULA would allow Google to use any Web content displayed in Chrome without getting permission
Spammers are piggy backing on legitimate sites' good reputations and then redirecting traffic to a dodgy site
Novell's Compliance Management Platform makes provisioning and access control a monitored activity kept in conformance with business security policy
ClearApp's software will work alongside Oracle's Enterprise Manager platform
Security experts warn that nearly 100 domains related to Hurricane Gustav have been registered, some of which may be used by bogus charity and relief scams
Google sees its open source Chrome browser as the doorway for broader use of its Web-based applications
VeriSign's CTO on securing the DNS infrastructure and whether new identity certificates add any value