New Endpoint Platform and Client-Server suite should take out some of the legwork, company promises
An Amazon.com glitch reduced the sales rankings of 57,000 titles - but something isn't right about the story of the…
Adobe's Flash player and Acrobat software were the top targets for hackers attempting to install malware on Europe's PCs during…
Security professionals should try to add value to business and make new business models possible, instead of focusing on restricting…
Experts contend the simple ability to map the electrical infrastructure is not the same as knowing how the system is…
A court has ruled that Microsoft's piracy-busting Product Activation system used technology patented by someone else. Meanwhile it was fined…
The hackers behind the infamous Conficker worm are making their move, roughly a week after many people expected
Storing and securing data more efficiently is the way IT managers are going to have to go during the recession
Foreign spies placed malware on the US electricity grid. Where does this leave government security, and the Green Grid?
From next week, Microsoft Windows XP and Office 2003 support and fixes will cost money. But that is much better…
The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and…
The government has awarded contracts to CSC and IBM to upgrade biometric passports and other systems that will pave the…
Creating a more efficient and secure way to exchange such medical information will lead to better patient treatment and improved…
If successfully exploited, the PowerPoint bug could enable hackers to take control of the victim's computer
If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the…
April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences -…
There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years,…
Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way…
Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says…
A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?
Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the…
Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can…
30 percent of SharePoint servers are deployed outside the management of the IT department.
There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience,…
Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply…
IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications
A new police e-crime unit will help combat the threat, according to payments industry body
Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise…