A critical flaw in the WP-Slimstat plugin could allow attackers to completely hijack vulnerable Wordpress sites.
Your passwords are one kind of secret you probably need to keep, even from trusted loved ones. A new survey from Intel Security reveals people's habits and the risks they might be taking.
There is a rise in fraudulent tax returns being filed by hackers armed with personal information from data breaches.
There's help for the 80 million individuals who could be affected by the Anthem data breach. A few proactive steps can help you stay alert to any attempted crimes using your personal data.
Cyber criminals use a sensitive topic to lure concerned parents into clicking something they shouldn't.
Free Office Online is a great deal, but paying for an Office 365 subscription gives you some hard-to-beat perks. We’ll help you decide which way to go.
Ironically, the same employees surveyed who were often lax on corporate security were nevertheless vigilant about their own digital security.
Calls for better information sharing and data breach reporting, and better cybercrime-fighting tools, could hamper innovation or infringe on privacy, experts caution.
Attackers may be able to infiltrate the network, but if organizations properly employed two-factor authentication the data would still be safe.
Cyber criminals hoping to monetize frequent-flier miles and other rewards target jetlagged travelers in recent data breaches.
Who could top the Sony hack? Someone will surely try. Experts weigh in on the most likely security exploits for the new year.
Any electronic communication, no matter how private, could eventually be made public.
More than 100,000 Wordpress websites have been compromised as a result of unused or insecure plugins.
Box's corporate customers need help managing the relentless growth of online storage and applications, let alone the mobile devices that access them.
Okay, but why? Data collected by cloud storage provider iDrive demonstrates that iOS users are more likely to back up data and use available privacy controls than their Android-using peers.
Articles by Tony BradleyNext Page