Covert surveillance requires extreme patience and the right gear. Here's a look at the products featured on PI Mall, an online resource for investigative professionals that offers items for gathering information without being detected.
Let us be perfectly clear: While Facebook has received a lot of criticism lately about its new privacy policies, Facebook isn't explicitly keeping secrets from you.
Ten years ago, in May, 2000, a security team with MessageLabs, a provider of messaging security services, came in to work and discovered the number of viruses its system had intercepted in the last several hours was off the charts.
The social networking site for shoppers will revamp security plans and bring an executive on board after user credit card numbers are exposed.
Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based...
Twitter's concern over security dangers with shortened URLs may be overblown, says a security firm's research.
New report from Sophos finds most Facebook and Twitter users have received spam or malware on the popular social networking sites.
Vendors admit many hardware-encrypted USB memory sticks contain a dangerous flaw that make them easy hack targets, and many more may be vulnerable.
While the risk of being hacked, conned or having sensitive information stolen is possible all through the year, most security experts agree that the holiday...
Spammers and malware authors are hoping to take advantage of fears and curiosity about the virus.
Security researchers have uncovered a spoof e-mail with downloadable files that include the Trojan virus Bredolab.
Despite a lagging economy, many workers will shop online while at work this coming holiday season, according to a survey.
Still got an old HP or Compaq laying around? CSO Publisher (and packrat) Bob Bragdon does! Rummaging around Bragdon's attic (with some memory help from mobile office expert Catherine Roseberry) provides a look at how mobile device security has evolved.
The practice, common on microblogging sites, is also a way for spammers to trick recipients into following a link.