Enterprises increasingly worry that their employees may be more willing to steal data or sell insider knowledge because of the …

Enterprises increasingly worry that their employees may be more willing to steal data or sell insider knowledge because of the …
Intel's upcoming Xeon server chips incorporate significant advancements that could form the basis for future chips that could handle high-performance …
Security researchers are in the dark about what will happen next week when the newest variant of Conficker, 2009's biggest …
When it comes to browsers, it seems that the main vendors are locked in the old design adage, but with …
Microsoft plans to make its Internet Explorer 8 browser available on today, along with a company-commissioned report claiming IE8 is …
Charlie Miller, the security researcher who hacked a Mac in two minutes last year at CanSecWest's PWN2OWN contest, improved his …
The third Conficker malware variant in infected machines is set to activate April 1, says the director of threat research …
The new generation of mobile Web browsers is going to introduce for enterprise IT departments a rash of security challenges. …
It’s just that F-Secure’s chief security advisor doesn’t want people overlooking the other 29,999 malware files his company sees a …
IBM's Zurich research laboratory has developed a USB stick that the company says can ensure safe banking transactions even if …
A worm that hit Facebook last December has resurfaced, a security researcher said today, and is now hijacking user accounts …
Computers infected by the Downadup worm will “phone home” to several legitimate URLs this month, including one owned by Southwest …
Days after Visa Inc. seemingly confirmed that a data breach had taken place at a third payment processor, following on …
SSL based Clean VPN integration delivers simplified and encrypted connectivity to remote network users while revolutionising protection by inspecting these …
For the second time in the past five days, security researchers are warning that hackers are exploiting a critical unpatched …
Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and …
A dangerous and unpatched vulnerability in Adobe Systems Inc.'s PDF-reading software has been around a lot longer than previously realized. …
Viruses and spam attacks targeting mobile phone users are on the increase, says McAfee. According to the security firm's annual …
Hackers have been exploiting a critical bug in Adobe Reader, the popular PDF-viewing software, for at least nine days, researchers …
What the average guy might call a con is known in the security world as social engineering. Social engineering is …