Snowden: I'd Do It Again
NSA whistleblower fields questions via live video feed at South by Southwest, calls encryption "defense against the dark arts."
9 Worst Cloud Security Threats
Leading cloud security group lists the "Notorious Nine" top threats to cloud computing in 2013; most are already known but defy 100% solution.
TSA Baggage Scanners Hackable
Researchers reveal weak security that could allow malicious insiders or attackers to spoof the contents of carry-on baggage.
Target Hackers Tapped Vendor Credentials
Investigators suspect that BMC software, Microsoft configuration management tools, and SQL injection were used as hacking tools and techniques in Target's massive data breach.
Target Breach: 10 Facts
Experts advise consumers not to panic as suspicion falls on point-of-sale terminals used to scan credit cards.
Welcome To The New InformationWeek
We're leaving behind the old, one-way publishing model of business technology journalism and pioneering an approach that emphasizes community and true multiway discourse.
Server Innovation Moves Slowly
Companies may be planning big data and Internet of things strategies, but they aren't buying the next-gen hardware to support them.
Google Barge: 10 Informative Images
When Google's floating cultural exhibit opens to the public, you probably won't see many Apple devices on board. Take a closer look at what we've learned so far.