Mobile security report finds cyber criminals adapt practices to maximize profits and minimize detection.
A study from Avecto found that almost all of the vulnerabilities reported by Microsoft in 2013 could be mitigated with one easy change to user privileges.
A study from Appthority of security and risky behavior in mobile apps yields some concerning results.
If you frequently wonder where the time goes, look no further than these tools.
OneNote is good for more than text-heavy to-do lists. These overlooked features help you manage meetings, organize content, record video and more.
The recent hack of Yahoo Mail is a great opportunity to stress common sense security practices.
Duck now: We're already knee-deep in data breaches, and this year also brings the imminent demise of Windows XP support and the certain rise of mobile malware.
Target, Nieman-Marcus and Michael's breaches are probably the tip of the iceberg and a sign of things to come.
Files on your backup drive may be as vulnerable as those on your PC, unless you take some important precautions.
South Korean wireless service providers are rolling out exponentially faster broadband than what we have in the US.
LogMeIn abruptly announced the end of its LogMeIn Free with a note to customers today.
It’s bad enough that Target allowed more than 100 million accounts to be compromised, but the retailer's response to the breach is an exercise in poor judgment.
Make sure you have a charging cable handy when you need it to recharge your mobile device.
VIPorbit makes it easier to keep all of your contact and calendar data in sync.
Revamp brings intuitive interface, faster document rendering, and progressive loading of photos.