A decade after the Y2K crisis, date changes still pose technology problems, making some security software upgrades difficult and locking millions of bank ATM users out of their accounts.
In choosing Howard Schmidt as cyber czar President Obama has gotten someone who has held a similar job in a previous administration and has varied experience.
A phony antivirus software package actually contains malware, in a new scam.
Comcast is trialing a service that tips off heavy users when they are about to run afoul of the company's acceptable use policy.
Separate cybersecurity fact from fiction in this survey of the threats posed by cyberattacks.
Here's the status and some straight answers on the proposed rule change regarding ISPs' responsibilities and access.
Identity theft concerns are keeping Americans from storing confidential data in the clouds, a study shows.
A single hacking group accounts for a quarter of all phishing attacks in the first half of 2009, a security study finds.
Net neutrality could lead to inexpensive, high-quality broadband services for businesses.
A blogger helping to tune a friend's wi-fi network uncovered a gaping security hole in Wi-Fi cable modem routers installed in 64,000 Time Warner subscribers' homes.
Malware ghouls took just a few hours to begin preying on the death of actor Patrick Swayze with a new version of a familiar phony anti-virus scam.
Data that enables network providers to route calls also enables them to gather data that tracks their customers' whereabouts; what's the compromise?
Practicing "safe surfing" can derail attempts to cruise the Internet anonymously.