Security | News, how-tos, features, reviews, and videos
Big Data is coming, but for most organizations it's three-to-five years away. That doesn't mean you shouldn't prepare now. Analyzing Big Data will require reference information like that provided by a semantic data model. And once you
The third-generation iPad will run unauthorized applications if it is modified
Law enforcement admitted filing the wrong paperwork under which they seized Kim Dotcom's property
Computer hackers could create malicious software that crosses the line from technology to biology, crafting viruses that could spread dangerous epidemics, researchers said at Black Hat Europe.
Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn
A new flaw found in Microsoft's Windows Remote Desktop Protocol (RDP) allows computers to be remotely accessed and enables an attacker to install malicious code. The bug also reportedly contains an exact copy of information Microsoft only gives
Jail-breaking a smartphone is not a secure practice
The reported "Anonymous OS" is a veritable one-stop shop for security tools, but the Hacktivist group of the same name claims it had nothing to do with the creation of the software--and that the OS is actually malware. But there's one
A new form of "smart" Android malware can not only steal your online banking information, but update itself in the future and secretly send contact information stored on your device off to the Bad Guys.
If your organizations has not implemented automated server access controls, you're exposing your business to risks ranging from compliance issues to insider fraud, corporate espionage and even nation-state sponsored attacks.
Sponsored Links