According to new research, employees remain a link in the chain ripe for exploiting, and phishing campaigns are an effective tactic to gain access to corporate networks.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Amazon Web Services customers can now use FireEye's threat analytics platform to keep sensitive corporate data stored in the cloud secure.
OPINION. The celebrity nudes 'hacking' scandal is a wake up call about security and human nature.
The antivirus provider will pay up to $220 million for Location Labs in a bid to expand its mobile security portfolio.
The private equity firm is acquiring BeyondTrust for $310 million in the hopes of securing business in the federal government space.
Three non-security updates that were withdrawn shortly after release in August have been re-released. Unexplained changes made to over 100 x64 Windows 7 updates.
UPDATED. Google is consciously using their influence to push certificate authorities to advance security standards soon. Would you believe the problem is Windows XP SP2?
A new HP report suggests the reclusive country's cyber warfare capabilities are rapidly making North Korea a credible threat to Western systems.
Correction. The Mac malware situation is a much lower-pressure one than that on Windows, so many products perform very well. But it's still worth comparing them, so AV-TEST.org tests 18 products, both free and paid.
UPDATED. Buggy updates are certainly a problem, but the company's poor communication of the problems is an even bigger cause for concern.