Security | News, how-tos, features, reviews, and videos
Andrey Baranovich, known as 'Herm1t,' should not be prosecuted, experts say
Most data breaches are not sophisticated and could be avoided by using security protocols that are already in place, according to new research from Verizon.
As email phishing operations have grown more sophisticated and convincing, it's harder for even savvy corporate email users to determine whether an email is authentic or fake. Here, CIO.com presents an example of a particularly convincing phish
Earthwave is offering a service to build and deliver a security operations center in under a year
If hackers gain access to a service providersu2019 systems, they can likely get to your systems, too. Rest assured, there are steps you can take to keep your cyber risk to a minimum.rn
With the surging popularity of Joomla, it's no surprise hackers are drawn to it as well. Don't panic, however. There are a number of things you can do to strengthen your security and turn your Joomla website into a fortress. Read along as w
The FBI says online threats could soon surpass terrorism and become the number one national security threat; Facebook apps for Android and iOS expose sensitive user information; Forbes publishes a list of hacker prices for OS exploits; and more.
The search giant only found answers to 24 of the European data protection authorities' 69 questions
The Cyber Intelligence Sharing and Protection Act (CISPA) says feds can ask ISPs and others for any info they want, and no restrictions on its use are currently in place.
In response to the embarrassing WikiLeaks data leak that laid bare lax information policies, a presidential task force is developing new standards and guidance for deterring and detecting insider threats.
Sponsored Links