Today's Top 9
How to survive inevitable cloud failures
When alien hardware invades: 4 keys to BYOD success
Is Yahoo's telework ban shortsighted or savvy?
Cool Mobile World Congress 2013 products we'd love to buy in the United States
Decoded: Microsoft's puzzling Office 365 rollout
Hands on with Chromebook Pixel: Google goes after the MacBook
Windows 8 uptake slows for third straight month
HTML5 flaw in leading browsers invites junk data storage
AMD plans to sell an APU based on modified PlayStation 4 hardware
Lucian Constantin writes about information security, privacy and data protection.
2 days ago in Security
Another Java flaw exploited, security researchers warn
Researchers discover new global cyber-espionage campaign
4 days ago in Security
Application-specific passwords weaken Google's two-factor authentication, researchers say
5 days ago in Security
Study of Chinese hackers is dangled as phishing bait
1 week ago in Security
updatedFacebook plugs hole that allowed account hijacking
1 week ago in Social media
Twitter implements DMARC standard to fight phishing
Adobe releases emergency patches for Reader and Acrobat
Oracle releases new Java fixes, speeds up patching cycle
Adobe confirms zero-day exploit bypasses Adobe Reader sandbox
2 weeks ago in Security
Researchers: Zero-day PDF exploit affects Adobe Reader 11, earlier versions
Researchers: Surveillance malware distributed via Flash Player exploit
Banking malware is getting sneakier, security firms warn
3 weeks ago in Business security
New Whitehole exploit toolkit emerges on the underground market
3 weeks ago in Security
Bad Kaspersky antivirus update keeps users from accessing websites
Articles by Lucian Constantin