With its own version of the productivity suite, the iPad looks more like the latest stage in the PC's evolution.
Some users are balking at being “forced” to spend more money to upgrade, but they’ve already received a remarkable ROI on XP.
With identity thieves increasingly targeting customer databases, your personal information is vulnerable no matter how diligently you protect it.
Targeted attacks and data breaches were the year's most popular methods according to a new report from Panda Security.
Evernote is more than a digital notepad. Try these tools to see how versatile it can be.
McAfee's Q4 2013 Threat Report details an underworld of off-the-shelf, plug-and-play exploit kits and malicious certificates.
AVAST has discovered a malicious app in the Google Play store that subscribes phone numbers to a premium messaging service.
New tech manipulates text to help you process data faster.
Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals according to a new survey from AppRiver.
The F-Secure H2 2013 Threat Report also cites government surveillance and Android malware as growing threats.
Thanks to a growing array of Internet-connected conveniences, your PC is not the only thing in your house at risk of being hacked.
Analysis of public tax returns found over half a million expose sensitive information.
Webroot mobile threat report illustrates dramatic rise in mobile malware—especially threats targeting Android devices.
Mobile security report finds cyber criminals adapt practices to maximize profits and minimize detection.
A study from Avecto found that almost all of the vulnerabilities reported by Microsoft in 2013 could be mitigated with one easy change to user privileges.