Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure. …


Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure. …

A hacker from Miami pled guilty to conspiracy to hack into computer networks at major U.S. retail and financial groups, …

A hacker from Miami pled guilty to conspiracy to hack into computer networks at major U.S. retail and financial groups, …

Adobe Systems’ Flash and Acrobat Reader products will become the preferred targets for criminal hackers in 2010, surpassing Microsoft Office …

Microsoft Corp. has added new features to existing offerings that address security and access challenges to worker mobility and social …

Adobe Systems' Flash and Acrobat Reader products will become the preferred targets for criminal hackers in 2010, surpassing Microsoft Office …

The verdict is in: Windows 7 is Microsoft's best operating system ever. It's stocked with genuinely handy interface upgrades (hello, …

The rise of the Conficker worm and Heartland Payment Systems' enormous data breach were two defining security events in 2009. …

While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …

Secure1st has announced its plans to conduct free monthly workshops beginning 2010, covering various areas of IT Security and Computer …

Secure1st has announced its plans to conduct free monthly workshops beginning 2010, covering various areas of IT Security and Computer …

Citigroup and a federal law enforcement source refuted a claim that the bank's customers lost millions of dollars in an …

While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …

While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow …

By recommending that users exclude some file extensions and folders from antivirus scans, Microsoft may put users at risk, a …

Hackers redirected Twitter.com's traffic to a rogue Web site for more than an hour early today by accessing its DNS …

Adobe won’t patch the newest critical vulnerability in its PDF viewing and editing software for another four weeks, even though …

Adobe won't patch the newest critical vulnerability in its PDF viewing and editing software for another four weeks, even though …

Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no …

Security measures such as one-time passwords and phone-based user authentication, considered among the most robust forms of security, are no …