Don't-Miss Business security Stories
Security, manageability, flexibility: Microsoft executives outlined several undisclosed features of Windows 8.1 at its TechEd conference on Monday.
Several longstanding malware scams resurfaced recently, and Amazon and Ruby on Rails were targeted by Internet reprobates. Here's what to watch out for.
The top-level domain name for the former Soviet Union becomes a magnet for denizens of online underworld.
Asking customers or employees to pull out their phones and input a code every time they want to log onto your site is too much friction. Here's what else you can offer them while keeping your brand safe.
A Gartner report about the security software market out today shows that No. 2 ranked McAfee enjoyed the most overall growth last year, Trend Micro slipped but stayed No. 3, and Symantec held onto its top spot in the $19.1 billion market.
Search giant puts heat on software industry to clean up its mistakes quickly--some within seven days.
Motorola debuted some experimental security technology that would allow users to access their devices via an electronic tattoo or by consuming a "vitamin authentication" pill every day.
Drupal.org has reset account passwords after it found unauthorized access to information on its servers.
Aiming to better address the security needs of businesses of all sizes that are facing increasingly complex attacks, McAfee has added two endpoint security suites to its product lineup.
Signature-based blacklisting security technologies are losing the battle against malware, says McAfee, which has streamlined its endpoint security offerings to two suites that it says provide next-generation security for all endpoints, whether PCs, tablets or ATMs.
Hackers are actively exploiting a critical vulnerability in the Ruby on Rails Web application development framework in order to compromise Web servers and create a botnet.
The Department of Homeland Security last week said it notified employees and others with DHS clearance to be on alert for potential fraud due to a vulnerability discovered in software used by a vendor to process personally identifiable information for background investigations. The software hole in had existed since July 2009.
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property.