All it took was nearly five years and a shuffle of senior management.
All it took was nearly five years and a shuffle of senior management.
The news comes off the back of Verizon dropping $250 million from its Yahoo purchase price.
If electronic money is just data, nothing physically stops a currency holder trying to spend it twice. Enter the Bitcoin blockchain.
Malware tricks users into opening Android Accessibility menu, enabling the attacker to mimic users' clicks and select anything displayed on their screen.
Trevor Hughes, president and CEO of the International Association of Privacy Professionals, explains how companies should prepare for GDPR and respond to global political uncertainty.
How can IT leaders get the rest of the board to support their move to the cloud?
This policy provides guidelines for the appropriate use of electronic communications. It covers privacy, confidentiality, and security and is intended to ensure that electronic communications resources...
Webcams, medical devices, routers and databases are only some of the devices on show.
Malware which robs you of passwords and iPhone backup data is thought to be linked to the same cyberespionage group accused of interfering with the US elections last year.
Updated: CrowdStrike deemed NSS Lab's operations "unethical, illicit, and subversive," but the courts did not uphold this belief.
Among the million websites cited in takedown requests to Google are a few unlikely alleged piracy websites, such as NASA, the US Department of Justice, and The White House.
People have been fending off hackers for decades, but things are much harder now that governments and government-sponsored hackers are fishing for data. Tech Solidarity has published a list of suggestions that aim to improve security without requiring any special technical skills.
Texas Republican Michael McCaul joins some key Democrats who could oppose potential Trump administration proposals.
At RSA 2017, Bracket Computing announced a pair of new features for its 'metavisor' and CEO Tom Gillis said it can both diagnose and prevent attacks that hide themselves inside the operating system.
As cyberspace becomes the new battlefield, nations should commit to protecting civilians from nation-state attacks in times of peace, he said at the RSA conference.
It's Microsoft Patch Tuesday, but the company is delaying issuing any patches for some unspecified period of time due to "a last minute issue."
CTO? That's so 2014. Wizards, sherpas and nomads are in
America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
Windows 10 doesn't make it easy for you to secure your privacy, but it can be done.
Take a plunge into the world of cybersecurity with these recommended reads.
What are the best five ways to stay safe online? Security professionals weigh in with these quick tips.
Using Adobe Flash can put your security and privacy at risk. Here's how to disable the plugin on Windows and Mac, and all major browsers.
Need a new book or two to read on the beach this summer? Check out our recommendations for technology fans.
From encrypted instant messengers to secure browsers, these security and privacy apps are some of the very best for protecting your devices.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
With so many IT disasters occurring every day, it's hard to pick the worst of the worst, but here are some real standout foul-ups.
What is malware, what does it do and how do I protect myself?
What are phishing campaigns, why do they exist and how do I protect myself?
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
Facebook's chief security officer Alex Stamos said the company is also exploring two-factor authentication options to boost security.
Cellular networking carriers can use the latest analytics technologies to detect bad behavior.
Tech-support scammers are having good luck reaching young victims with pop-up ads.
Don't be tricked into handing over your online banking credentials to cybercriminals.
The entire Web seemed to be broken Friday for users in the United States, with many major sites suffering outages.
Business users find high-capacity USB thumb drives to be fast, convenient, and the perfect personal cloud. Until they get lost. If protecting confidential data is important, here's a USB thumb drive that will do the job.
If we can't protect our laptops, why should we think we can protect a fleet of robots?
Craig Davies, head of security at Atlassian, explains how the company has built a "playbook" for responding to attacks -- and how he gets everyone to follow it.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
Apple's newest iPod gets a makeover, adds some evolutionary upgrades, and delivers more bang for the buck. But are these changes enough to make a big splash?
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
We take a peek at one of Sony's upcoming Hi-MD portable music players, supporting a gigabyte of removable storage thanks to the company's new higher-capacity MiniDisc. Sony's upcoming range of digital music players revamps previous MiniDisc players by introducing Hi-MD media.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
If you're a penny-pincher, the free version of Ad-aware 6.0 is a good choice for spyware protection.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.