Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Many of the biggest security breaches occurred through a USB stick. Find out how companies are protecting themselves.


This Trojan Horse keystroke logger is believed to be a special FBI surveillance program that can be installed remotely via an email...


Mobile apps have more than their share of security problems. Here's what you need to know.


Most users carry quite a bit of sensitive data on their tablets, which means that skimping on security could be a costly mistake. Find out...


Many big companies are offering two-step authentication, but while it's better than many of the alternatives, it's no iron fortress.


CISPA failed in the Senate, but that doesn't mean it's dead. Here's what to look for in the next go-round.


Even the most novice PC users can be up and surfing the net on their shiny new machine in no time. Here are some beginner tips to get you...


As Twitter becomes an increasingly important source of information, hackers are turning it into a playground. Check out some of the biggest...


In 2013, it's companies, advertisers and online service providers who are most keen on learning more about us, not so much so that they can...


Privacy for ourselves but not for others doesn't make sense, but that doesn't stop us from wanting it. Read about how the privacy debate's...


DNS must run smoothly so that the Internet may continue to function correctly. Learn more about how it works - and when it doesn't - here.


BYOD has many benefits, but it also comes with security risk. Here are some of the key ways that companies can secure their data.


Academic research and publications can help hackers, leading to an ongoing duel between security researchers and the crooks seeking to...


Click fraud may be a virtual crime, but its effects are becoming increasingly real for consumers and businesses.


This infographic examines some of the online communication factors that can facilitate trolling and how users can tone down some of their...


Unlike the Grinch in the Dr. Seuss tale, this one steals corporate data, and when things like credit card and sensitive corporate...


There is a hacker code of ethics. Unfortunately, a few hackers have been breaking it for years, putting everyone at risk.


As recently as five years ago, hurricanes would have kept us in our homes. But times have changed. Find out why writer John McMullen sought...


Sixty percent of computer users believe their data is worth about $1,000. Shouldn't you be backing yours up? We show you how.