Resources related to information security, including news and opinion and more on software and application flaws and fixes, data breaches, the inside threat the latest hacker attacks.
Fri, May 17, 2013 - The companies allegedly charged customers to fix nonexistant computer problems
Fri, May 17, 2013 - The four suspected hackers are accused of taking control of the Italian branch of Anonymous
Fri, May 17, 2013 - It's not enough to offer the latest wireless standard. Make sure the router that will support your office is up to snuff.
Fri, May 17, 2013 - Mobile vendors are pushing technologies that split a smartphone into two separate platforms for business and personal data. Problem solved, right? Not so fast. It's still easy for employees to circumvent the two worlds.
Fri, May 17, 2013 - Experts say large-scale security analytics can cut through the noise to find key intelligence. But connecting the dots can lead to legal trouble.
Fri, May 17, 2013 - The BlackBerry has always been a business phone. The iPhone wowed us all--and it nearly put BlackBerry out of business--but it emphasizes entertainment and not productivity. If you're an IT executive, it's finally time to put function before form, CIO.com columnist Rob Enderle writes.
Fri, May 17, 2013 - In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
Fri, May 17, 2013 - Microsoft has noticed a small uptick in viruses that infect files
Thu, May 16, 2013 - British hackers Topiary, Kayla, T-Flow and Viral received prison sentences for their roles in LulzSec's 2011 cyberattacks
Thu, May 16, 2013 - Attacks on digital assets are on the rise, and the black hats get more inventive every day. How should educators prepare tomorrow's information security gurus?
Thu, May 16, 2013 - Oracle has changed the numbering of its Java security updates, prompting one expert to say, "As if Java updates weren't confusing already."
Thu, May 16, 2013 - Virtual padlocks can keep storage providers -- and the government -- from accessing data in the cloud
Thu, May 16, 2013 - In an alarming 'post-PC' era alert, working group says criminal infrastructure created much faster than it was for PC fraud.
Wed, May 15, 2013 - University researchers have developed a methodology for enabling networked devices in an industrial control system to police each other for abnormal behavior that would indicate a compromise.