Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




As cyber threats continue to evolve, old security solutions just don't cut it. Here are a few technologies that have been rendered minor...


The growing proliferation of personal devices in the workplace is a bit of an albatross for IT administrators. MDM and MAM aim to help. The...


Ever since we found out the NSA was collecting millions of phone records, it's easy to wonder whether we're all being watched. Here we try...


Here are five key points to remember about the National Security Agency's (NSA) domestic surveillance program and your electronic security.


This infographic provides a deeper look into how police are using computers to solve crimes.


Before the extent of mass surveillance in the U.S. was revealed, we could all claim we didn't know any better. Now the problem - and our...


Maintaining online privacy and security is something everyone can take into their own hands - to some extent. Here are five top ways to...


While you're trying to make your friends jealous by splashing pictures of yourself drinking Mai Tais on a beach, burglars may be checking...


Many of the biggest security breaches occurred through a USB stick. Find out how companies are protecting themselves.


This Trojan Horse keystroke logger is believed to be a special FBI surveillance program that can be installed remotely via an email...


Mobile apps have more than their share of security problems. Here's what you need to know.


Most users carry quite a bit of sensitive data on their tablets, which means that skimping on security could be a costly mistake. Find out...


Many big companies are offering two-step authentication, but while it's better than many of the alternatives, it's no iron fortress.


CISPA failed in the Senate, but that doesn't mean it's dead. Here's what to look for in the next go-round.


Even the most novice PC users can be up and surfing the net on their shiny new machine in no time. Here are some beginner tips to get you...


As Twitter becomes an increasingly important source of information, hackers are turning it into a playground. Check out some of the biggest...


In 2013, it's companies, advertisers and online service providers who are most keen on learning more about us, not so much so that they can...


Privacy for ourselves but not for others doesn't make sense, but that doesn't stop us from wanting it. Read about how the privacy debate's...


DNS must run smoothly so that the Internet may continue to function correctly. Learn more about how it works - and when it doesn't - here.