Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...


The Internet is full of learning opportunities, it also includes inappropriate sites, pornography, hackers and a range of other things many...


The major stumbling block for virtual currencies has been security, but this cryptocurrency thinks it has the answer. Learn all about...


No matter where you turn, it seems there's a new, more powerful computer virus. This infographic shows some of cyberwarfare's recent...


Check out these sobering statistics on the privacy problem, and some best practices on how users can protect themselves.


While foreign countries often get the blame for scams, spam and identity theft, much of it actually orginates in the good ol' U.S.A. Find...


Small businesses often assume they're safe from cyber attacks and take few measures to protect themselves. Big mistake.


When it comes to using their smartphones and tablets for work, employees won't take no for an answer.


This new standard holds major opportunity for the Web, but there are still a few hurdles to overcome.


Carol Balkcom, director of product management at CompTIA, tells us about CompTIA's security certifications and how they can help IT pros...


Marketers have always gathered data about potential customers, but what they know is getting increasingly specific - and personal.


Whether you want to stream a video or leave an anonymous comment, it's nice to be able to browse the Web without allowing the sites you...


The controversial and divisive CISPA, or Cybersecurity Bill, has privacy advocates and the tech lobby at war. Here is what you need to know.


Snort is a passive tool for network packet analysis and network forensics, but it isn't a security solution. Learn more about it here.


As the public awareness of data breaches and their potential financial impact grows, governments are expanding legislative and regulatory...


These threats come from attackers with substantial means, backing and motivation to inflict major damage.


These computer viruses all rocked the Internet. Find out which one really caused the most damage.