A password management service discovers that the Heartbleed bug can be used to target individual users.
HP's 2013 Cyber Risk Report found most security risks result from configuration errors rather than flaws in the application itself.
Security experts weigh in on the vulnerability of OpenSSL and whether the open source process needs more scrutiny.
Microsoft has released the final patches for Windows XP. Support is officially expired, and you’re on your own.
Technically, upgrading Windows XP to a newer OS is an option, but it doesn’t make any sense from a financial perspective.
What's the worst that could happen when Microsoft ends Windows XP support? Do you really want to find out?
Cyber crooks have an arsenal of tools and techniques designed to prey on unsuspecting individuals during tax season.
The competing suites square off over features, file compatibility and ease of use.
With its own version of the productivity suite, the iPad looks more like the latest stage in the PC's evolution.
Some users are balking at being “forced” to spend more money to upgrade, but they’ve already received a remarkable ROI on XP.
With identity thieves increasingly targeting customer databases, your personal information is vulnerable no matter how diligently you protect it.
Targeted attacks and data breaches were the year's most popular methods according to a new report from Panda Security.
Evernote is more than a digital notepad. Try these tools to see how versatile it can be.
McAfee's Q4 2013 Threat Report details an underworld of off-the-shelf, plug-and-play exploit kits and malicious certificates.
AVAST has discovered a malicious app in the Google Play store that subscribes phone numbers to a premium messaging service.