Security | News, how-tos, features, reviews, and videos
One man gets five and a half years in prison, another receives six years
Attacker could access entire contents of database by taking advantage of vulnerability that affects SAP's MaxDB
Only recently have hackers lined up the technology and technique to reap open-recursive DNS servers' weaknesses
California First Amendment Coalition calls on organization to push China to stop Internet censorship
Companies wary of the impact of vulnerability scanning on their programs may find relief in Cenzic's virtual scanning, which scans exact replicas of apps
Federal Rules of Civil Procedure don't apply to the CIA, but agency's decision to destroy videotapes may show private companies how not to handle evidence
While some partners have turned off Beacon until Facebook makes more changes, others are reticent to speak on the subject
Embedded security features, code-named Danbury, make application encryption easier, add new layer of hard drive protection
Former Microsoft worker whose error resulted in massive 1999 Hotmail outage also found guilty of billing company for more than $1 million in false expense reports