Microsoft's Internet Explorer continues to dominate corporate browser use more so than it does private use.
The Avalanche phishing menace may be preparing a more dangerous version of itself, security experts say.
New computer forensic tools will make it possible to recover more data from corrupted hard drives so long as the missing filles haven't been overwritten.
When the LoveBug worm hit 10 years ago, it was a different time when people believed admirers were really reaching out to say "I love you", personal firewalls...
Hackers often pay closer attention to business policies regarding social networks than the businesses do, a security consultant notes.
Pulling criminal data off cell phones and game consoles is a challenge, law enforcement admits.
A Twitter storm rages on as Windows XP users recover from defective McAfee security update.
Dorm room, basement, garage, university lab? Where did it all begin for Google, Cisco, Microsoft, and others?
Internet attacks from China like those against Google and other U.S. firms are expected to double this year.
Mutations of the Kneber botnet could unite long after their release to wreck havoc, researcher says.
The Kneber botnet has infected at least 75,000 computers at 2,500 companies and government agencies worldwide. Here are some answers to frequently asked questions about the botnet.
A Facebook feature that allows posting via e-mail reply could be exploited for cyber-bullying, security firm warns.
What were the first products from today's biggest tech companies? Cisco, Microsoft, Apple, IBM: They all started somewhere.