The rise of the Conficker worm and Heartland Payment Systems' enormous data breach were two defining security events in 2009. …
Five big questions about cloud computing
In a largely downbeat year, I couldn’t help but delight in Larry Ellison’s over-the-top takedown of cloud computing last September. …
Five big questions about cloud computing
In a largely downbeat year, I couldn't help but delight in Larry Ellison's over-the-top takedown of cloud computing last September. …
EMC finally rolls out FAST
EMC rolled out this week its much anticipated FAST software, which automatically migrates data between tiers of storage based on …
Start a new Mail message from any application
Does your Mac usage involve sending lots of e-mail messages? So much so that you'd love to be able to …
How to speed up everything
Has your PC lost its pep? How about your network connection, your printer, or even your phone? Here’s our guide …
How to speed up everything
Has your PC lost its pep? How about your network connection, your printer, or even your phone? Here's our guide …
New iPhone worm steals online banking codes, builds botnet
Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online …
BlackBerry security exec warns of smartphone DDoS attacks
BlackBerry and smartphone security in general hasn’t garnered much attention or concern over the past few year, at least from …
BlackBerry security exec warns of smartphone DDoS attacks
BlackBerry and smartphone security in general hasn't garnered much attention or concern over the past few year, at least from …
Nasty banking Trojan makes mules of victims
A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to …
Windows Mobile's demise greatly exaggerated, iSuppli says
Windows Mobile is not dead and, in fact, its use on smartphones will nearly triple by 2013, according to analyst …
New Trojan gives criminals full-service bank theft
Security experts agree that cyber-criminals are getting better, but a new Trojan takes things to a whole new level. The …
With ACS, Xerox will gain a firm growing quickly offshore
In agreeing to pay $6.4 billion for Affiliated Computer Services Inc., Xerox Corp. will gain a company that has so …
Block data leaks at the endpoint
It almost goes without saying that the greatest threat to the security of an enterprise network often comes from within. …
Domain-name abuse proliferates
For legitimate businesses, a domain name is a way to hang a shingle in cyberspace. In the criminal world, domain …
Microsoft patches critical MP3 flaw
This Patch Tuesday fixes from Microsoft include six critical bulletins that head off potential attacks involving poisoned media files and …
Instant messaging speeds up data theft danger
One of the more sophisticated pieces of malware in circulation has been given an upgrade that lets cybercriminals act even …
Could Google be tricked into talking to botnets?
Cybercriminals could start to take advantage of the popularity of search engines like Google as vehicles for relaying malicious code …
New Threat: Clampi
The Clampi Trojan, believed to have infected hundreds of thousands of machines, basically functions as a botnet under the command-and-control …