April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences -…
There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years,…
Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way…
Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says…
A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?
Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the…
Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can…
30 percent of SharePoint servers are deployed outside the management of the IT department.
There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience,…
Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply…
IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications
A new police e-crime unit will help combat the threat, according to payments industry body
Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise…
Security consultants have engineered a worm which can bring down smart grids - while AT&T launches a product and the…
Panda says the updated release is up to 50 percent more efficient than traditional endpoint security
With Adobe releasing further patches and vulnerability updates for Acrobat and Reader, the question has to be asked, is it…
Threats are growing, and companies simply do not have the option to ignore the problem. This will drive a more…
Microsoft to launch open-source security analyser for application developers.
Some features catch up with rival browsers, others add new abilities and security functions. If you are an IE user,…
Security, ease of use, and improvements in RSS, Cascading Style Sheets and AJAX support are key priorities for Internet Explorer…
If the merger goes ahead, IBM will have to make choices: Which database, which directory, and which virtualisation technology?
While all around are making short term decisions, you have to keep you head, and make sure your long term…
Social Networking and Cloud Computing are proving a headache for organisations.
GFI LANguard network vulnerability and patch management software is most useful to SMBs.
The minds behind the Waledac botnet are using the physical location of victims' machines in a scheme to lure them…
Employees are increasingly using personal PCs in their jobs, and IT staff have to support them. eWEEK Labs explores some…
What the BBC did was wrong. The corporation should stop defending its botnet antics, and act responsibly
Programme makers claim that use of illegal networks was justified
Mozilla has released its Firefox 3.1 beta 3 Web browser, intended for developers and testers for evaluation and feedback.