Don't-Miss Firewall Stories

10 Cool Things Virtualization Lets You Do

If you haven’t tried virtualization yet--or don't even know what it means--it’s about time you did. Here are 10 reasons to tempt you into the virtualization waters.

Why Trustworthy Sites Can No Longer Be Trusted

Cybercriminals are hacking trusted sites using stolen access credentials in order to launch attacks that are out in the open, but also veiled from reputation filters and commonly blocked web categories. Here are three reasons researchers say you need to be wary -- even on sites you count as safe

Pay No Attention to That Widget Recording Your Every Move

Ever wonder how much of a time suck Bejeweled is? Your boss doesn't need to spy and tell you. These tools track your online activities and tell you how to be more productive.

Hybrid Cloud Computing Security: Real Life Tales

Mixed IT infrastructures, including cloud and non-cloud systems, will be the norm at many companies for many years.

Skype and Facebook: When Social Media Collide

If using Skype and Facebook together is triggering pop-up browser windows that clutter your screen, you're not alone. Here's how to stop that headache.

Smartphone Security Threats Overdramatized, Experts Say

Don't believe the hype that says mobile malware will soon flood our smartphones, experts say.

WikiLeaked: Three Lessons From the Cat in the Bag

Leaking secrets online has become a big issue. Here are three lessons you need to learn.

Avast Antivirus 6.0 Combats Trojans With Virtualization

Czech security company Avast Software is adding virtualized security to the forthcoming version of its paid antivirus software.

Feds Wrongly Links 84,000 Seized Sites to Child Porn

Imagine you're a law-abiding small business owner. You show up to find your shop door locked, with a sign saying the government has seized your business due to child pornography.

Survey: Mobile Devices Pose One of the Top Security Threats

After application vulnerabilities, information security professionals are most concerned by the threats posed by mobile devices, a survey has revealed.

RSA: Act Now on Cyberwar, Security Experts Caution

The time has arrived for the U.S. to develop a strategic plan for dealing with threats against critical infrastructure.

Obama Seeks Big Boost in Cybersecurity Spending

The White House is proposing a big increase in cybersecurity research and development in next year's budget.

Tablets and Smartphones Force Cisco to Rethink Security

Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization.