What's the worst that could happen when Microsoft ends Windows XP support? Do you really want to find out?
Cyber crooks have an arsenal of tools and techniques designed to prey on unsuspecting individuals during tax season.
The competing suites square off over features, file compatibility and ease of use.
With its own version of the productivity suite, the iPad looks more like the latest stage in the PC's evolution.
Some users are balking at being “forced” to spend more money to upgrade, but they’ve already received a remarkable ROI on XP.
With identity thieves increasingly targeting customer databases, your personal information is vulnerable no matter how diligently you protect it.
Targeted attacks and data breaches were the year's most popular methods according to a new report from Panda Security.
Evernote is more than a digital notepad. Try these tools to see how versatile it can be.
McAfee's Q4 2013 Threat Report details an underworld of off-the-shelf, plug-and-play exploit kits and malicious certificates.
AVAST has discovered a malicious app in the Google Play store that subscribes phone numbers to a premium messaging service.
New tech manipulates text to help you process data faster.
Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals according to a new survey from AppRiver.
The F-Secure H2 2013 Threat Report also cites government surveillance and Android malware as growing threats.
Thanks to a growing array of Internet-connected conveniences, your PC is not the only thing in your house at risk of being hacked.
Analysis of public tax returns found over half a million expose sensitive information.