Michelle Marsico's two-year ordeal ends with lawsuit settlement
Companies are still only ramping up "bring your own device" policies that let employees use their own smartphones and tablets for business, but in many instances, they're finding BYOD is pricier than just issuing devices themselves.
The year started off with the FBI raiding the cloud file-sharing and storage Megaupload site, and last month the University of Nebraska acknowledged a data breach that exposed personal information on students and employees, plus parents and university alumni.
The passwords used by the eHarmony site visitors shows that names of sports teams, dogs, states and masculine and feminine names formed the foundation of many of the passwords.
McAfee's co-President discusses the merger of chip manufacturing and security software.
Network firewalls and mainframes are old technology, but despite calls over the years to do away with one or the other, they remain in widespread use.
Security firm Trend Micro is rebutting claims by a hacker about breaking into the Trend Micro network and installing a backdoor to unauthorized information.
How prevalent is the use of tracking cookies that get planted on your computer after browsing a website so it can keep track of what you're doing?
Tough criticisms heard this week from researchers about the effectiveness of two-factor authentication, especially as it's used in its token form for one-time passwords and smartcards, suggest advances need to be made to restore its luster as security protection.
It was learned that the malware was stealing files and mailing them off to what appeared to be a service provider in China.
This time, it's not payment card data but personal information on merchant applications.
Virtualization is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world.
The unusual security stuff for sale at the recent GovSec Conference in Washington, D.C.
Despite calls for more information about how Apple stores and analyzes the voice data it may be collecting through its Siri feature, Apple hasn't offered much explanation.
VMware today said its virtual-machine infrastructure software, vSphere 5.0, has achieved certification under what's known as the Common Criteria program.