Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
A cyber warrior under contract with the U.S. government provides some extraordinary glimpses into his background, training, the hardware he uses, and the boundaries of his mission.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.
Antimalware software can detect infections, but fixing those problems still means wiping and rebuilding your hardware.
By setting up bogus domains, cyber criminals can intercept messages containing sensitive personal and proprietary information.
Cloud computing, mobile technology, and Web 2.0 have altered the debate on whether Microsoft or Apple offers superior security
Cyber criminals are facing more tech-savvy law-enforcement agents and harsher sentences.
Analysis: "Trojan mouse" was just a hint -- almost any hardware device that can be plugged into a computer can compromise its security
A few answers help clarify what the MacDefender scareware plague really means for Mac users and administrators
Low-cost, low-fuss honeypots are highly effective early-warning systems against external attacks and insider threats: A look at KFSensor, HoneyPoint, and Honeyd.
How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it
Analysis: Linking apps to other software and platforms is inevitable -- but it opens a security hole.
Articles by Roger A. GrimesNext Page