Security | News, how-tos, features, reviews, and videos
CA alleges its rival hired away developers and stole source code
AP licensing deal passes the one-year mark but promised offerings have yet to be delivered
European project will serve as early warning system by keeping an eye on malware and computer attacks around the world
Chinese state-run online and print media routinely use photos without proper attribution or copyright permission
Low-risk worm spreads via removable flash drives and copies itself to all drives on a PC
Problems in the way browsers work with the DNS can be exploited to give attackers access to other resources on the user's network
Think you can use technology to keep a tight rein on user behavior? Think again
Experts claim that many companies are unknowingly leaving the door open for outsiders to infiltrate and attack their corporate intranets using new hacking techniques such as cross-site request forgery
Experts say attacks are made easy by a lack of expertise among developers working with the AJAX language
Efforts to share security data are helping to foster community approach necessary to improve IT practices, said an NSA expert presenting at Black Hat