Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




As recently as five years ago, hurricanes would have kept us in our homes. But times have changed. Find out why writer John McMullen sought...


Sixty percent of computer users believe their data is worth about $1,000. Shouldn't you be backing yours up? We show you how.


Spam may be little more than annoying email. Then again, it might just steal your identity or drain your bank account.


If you are on the Internet regularly, chances are you have come across a site that uses OAuth. Find out how the newest version of this...


The Internet is full of learning opportunities, it also includes inappropriate sites, pornography, hackers and a range of other things many...


The major stumbling block for virtual currencies has been security, but this cryptocurrency thinks it has the answer. Learn all about...


No matter where you turn, it seems there's a new, more powerful computer virus. This infographic shows some of cyberwarfare's recent...


Check out these sobering statistics on the privacy problem, and some best practices on how users can protect themselves.


While foreign countries often get the blame for scams, spam and identity theft, much of it actually orginates in the good ol' U.S.A. Find...


Small businesses often assume they're safe from cyber attacks and take few measures to protect themselves. Big mistake.


When it comes to using their smartphones and tablets for work, employees won't take no for an answer.


This new standard holds major opportunity for the Web, but there are still a few hurdles to overcome.


Carol Balkcom, director of product management at CompTIA, tells us about CompTIA's security certifications and how they can help IT pros...


Marketers have always gathered data about potential customers, but what they know is getting increasingly specific - and personal.


Whether you want to stream a video or leave an anonymous comment, it's nice to be able to browse the Web without allowing the sites you...


The controversial and divisive CISPA, or Cybersecurity Bill, has privacy advocates and the tech lobby at war. Here is what you need to know.


Snort is a passive tool for network packet analysis and network forensics, but it isn't a security solution. Learn more about it here.


As the public awareness of data breaches and their potential financial impact grows, governments are expanding legislative and regulatory...


These threats come from attackers with substantial means, backing and motivation to inflict major damage.