ALL security Stories
Success in national security is measured by how well the government collaborates with partners and customers, says Gen. Keith Alexander, Commander...
Apple's waiting list to bypass security controls on latest-generation iPhone and iPad devices means months-long delays for law enforcement...
Data markets could become a new market category. Here, companies buy, sell or trade data for mutual benefit.
Readers detail "frozen DNS Trojan" cold calls and "repairs" that lead to $882 in unauthorized wire transfers.
Better data analysis helps banks rile fewer customers while trying to stop credit card fraud.
The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.
Our survey shows users aren’t fond of UTM appliances.
Company founder denies that Huawei employees would ever be forced to spy for China.
U.K. government provides grants to University of Oxford and Royal Holloway, University of London to fund doctoral programs in cyber security.
N.Y. men indicted for alleged roles in orchestrated massive global "bank heist" that targeted a MasterCard credit card processor, coordinated mass...
State officials don't know when attackers accessed up to 160,000 Social Security and 1 million driver's license numbers stored in unencrypted format.
Can you stop recording me now? That's one worry early Google Glass users say they're trying to soothe while creating social norms for the...
In move to ratchet up pressure on China, U.S. would detail what technologies and products are being stolen and which foreign firms benefit.
'Fix it' now available as a temporary defense until actual patch is ready; only IE 8 is affected by flaw.
Antivirus pioneer and former fugitive from justice in Belize John McAfee shares more about his code-slinging and drug-smuggling past.
Satire site The Onion details multi-pronged Twitter account takeover strategies used by hacktivists.
Meanwhile, hackers behind Cdorked malware that targets Apache servers now have extended it to infect open-source Nginx and Lighttpd server software.
All Internet traffic from the war-torn country -- via overland and submarine connections -- went offline Tuesday.
DHS predicts Tuesday's hackathon will involve little more than nuisance exploits. Meanwhile, Syrian Electronic Army hacks Twitter feeds of satire...
To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to...
Respondents to our IT Spending Priorities Survey say they're playing catch-up.
Department of Defense approves use of BlackBerry and Samsung devices by military and government workers, a big win for the two companies.
No financial, credit card or account details were exposed, said site, but attackers stole encrypted passwords of "a minority" of customers.
While websites harbor fewer bugs overall, 86% of sites have at least one serious flaw that could be used in an attack, reports WhiteHat Security.
Facebook's new Trusted Contacts option lets friends assist with account recovery, so Facebook personnel don't have to.
- Secure your mobile applications in the new commerce era - Mobile Commerce World - Mobile Commerce World
- Get practical information on how to develop your organization's mobile commerce application - Mobile Commerce World - Mobile Commerce World
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- Learn how to move your broadband service to an All-IP network at TelcoVision (formerly TelcoTV) - TelcoVision
- Learn how to best integrate mobile commerce with your current systems -- Mobile Commerce World - Mobile Commerce World
- The Untapped Potential of Mobile Apps for Commercial Customers
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- Getting a Grip on Mobile Malware
- Is Your Vulnerability Management Program Keeping Pace With Risks?
- Safe and Secure Cloud Computing: Is there such a thing?
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue