AVAST has discovered a malicious app in the Google Play store that subscribes phone numbers to a premium messaging service.
New tech manipulates text to help you process data faster.
Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals according to a new survey from AppRiver.
The F-Secure H2 2013 Threat Report also cites government surveillance and Android malware as growing threats.
Thanks to a growing array of Internet-connected conveniences, your PC is not the only thing in your house at risk of being hacked.
Analysis of public tax returns found over half a million expose sensitive information.
Webroot mobile threat report illustrates dramatic rise in mobile malware—especially threats targeting Android devices.
Mobile security report finds cyber criminals adapt practices to maximize profits and minimize detection.
A study from Avecto found that almost all of the vulnerabilities reported by Microsoft in 2013 could be mitigated with one easy change to user privileges.
A study from Appthority of security and risky behavior in mobile apps yields some concerning results.
If you frequently wonder where the time goes, look no further than these tools.
OneNote is good for more than text-heavy to-do lists. These overlooked features help you manage meetings, organize content, record video and more.
The recent hack of Yahoo Mail is a great opportunity to stress common sense security practices.
Duck now: We're already knee-deep in data breaches, and this year also brings the imminent demise of Windows XP support and the certain rise of mobile malware.
Target, Nieman-Marcus and Michael's breaches are probably the tip of the iceberg and a sign of things to come.
Articles by Tony BradleyNext Page