security: End user/client security
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
12 Gifts For The End Of The World
December 20, 2012Some believe the world will end on December 21, 2012; NASA insists it won't. We've assembled a list of a few useful tools for any outcome.
-
Attack Turns Android Devices Into Spam-Spewing Botnets
December 19, 2012Beware Trojan app sending 500,000 spam SMS messages per day, charging messages to smartphone owners.
-
Bromium Secures Older PCs, Terminals Via 'Microvisor'
December 17, 2012CTO Simon Crosby says goal is to isolate untrusted tasks on Windows XP machines, thin clients as users bring outside code and content inside the...
-
Could A Thumb Drive Stop Stuxnet?
December 12, 2012Kingston launches USB thumb drives with built-in ESET antivirus software to eliminate viruses, Trojan applications, rootkits, and worms.
-
10 Security Startups To Watch In 2013
December 12, 2012Convergence of two strong business trends -- security services and cloud services -- made 2012 a good year for startups combining aspects of both...
-
Microsoft Warns Necurs Rootkit Spreading Quickly
December 11, 2012Necurs found on more than 83,000 machines; Microsoft report calls rootkit a "prevalent threat."
-
5 Rules For (Almost) Painless Encryption
December 10, 2012Even as mobility and cloud take off, too many companies still leave data in the clear, spooked by operational concerns. Yes, key management...
-
Twitter Users Vulnerable To SMS Spoofing Attack
December 04, 2012Twitter vulnerability would allow attackers to post messages to targeted accounts. Similar flaw has already been addressed by Facebook and SMS...
-
Centrify Harnesses Active Directory For Mobile Device Management
December 03, 2012DirectControl for SaaS promises convenient single sign-on to cloud apps and services for mobile users and secure, simple deployment for IT.
-
Facebook 'Privacy Notice' Has No Legs
November 29, 2012But Facebook should be looking at why the notice went viral.
More
News »
Slideshows
Resource Links
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












