Security consultants have engineered a worm which can bring down smart grids - while AT&T launches a product and the…
Panda says the updated release is up to 50 percent more efficient than traditional endpoint security
With Adobe releasing further patches and vulnerability updates for Acrobat and Reader, the question has to be asked, is it…
Threats are growing, and companies simply do not have the option to ignore the problem. This will drive a more…
Microsoft to launch open-source security analyser for application developers.
Some features catch up with rival browsers, others add new abilities and security functions. If you are an IE user,…
Security, ease of use, and improvements in RSS, Cascading Style Sheets and AJAX support are key priorities for Internet Explorer…
If the merger goes ahead, IBM will have to make choices: Which database, which directory, and which virtualisation technology?
While all around are making short term decisions, you have to keep you head, and make sure your long term…
Social Networking and Cloud Computing are proving a headache for organisations.
GFI LANguard network vulnerability and patch management software is most useful to SMBs.
The minds behind the Waledac botnet are using the physical location of victims' machines in a scheme to lure them…
Employees are increasingly using personal PCs in their jobs, and IT staff have to support them. eWEEK Labs explores some…
What the BBC did was wrong. The corporation should stop defending its botnet antics, and act responsibly
Programme makers claim that use of illegal networks was justified
Mozilla has released its Firefox 3.1 beta 3 Web browser, intended for developers and testers for evaluation and feedback.
A plan to create a single UK database of prisoner records has spiralled to more than £500 million
The minds behind BBC television program "Click" have inadvertently thrust themselves into an ethical quagmire.
The last few months has seen a spike in hackers trying to steal data, researchers say
Firefox surpassed IE in the number of bugs reported in the software in 2008, say security researchers
In 1999 the Melissa worm announced a new kind of attack. Ten years later, the security industry is still catching…
Video: IT is not just cleaning up its own act. It will be the driving force in allowing every sector…
As the industry changes, a new resource has arrived to help IT professionals excel in their mission
The network giant's hosted service has flexibility - but can it compete with existing players like Symantec and Google?
Low-cost laptops are vulnerable because many of them come without standard security software, according to experts
With hackers circling round a flaw in Adobe Acrobat, security professionals have advice on how to survive till Adobe gets…
Botnets change quickly to avoid being taken down. Larry Seltzer assesses a move to combat them - and says more…
If your applications aren't behaving the way you expect, the problem may not be where you think. Peter Judge found…
Sixty percent of people who lose their jobs take company data with them when they go, according to a study…
Adobe has promised to fix a zero-day vulnerability which allows lets hackers seize control of users' computers - but the…