Look closely at that surge protector under your desk. It might be covertly spying on you and your network.
What if iris scans could be faked for real via a simple printed image to fool iris recognition systems?
If there's one myth in the information security field that just won't die, it's that an organization's security posture can be substantially improved by regularly training employees in how not to infect the company.
Nvidia said it is investigating the release of encrypted passwords from its user forums, another significant data breach following recent compromises at Yahoo.
Security experts warn that "active defense" or "strike-back" techniques could escalate the battle with hackers.
Hackers breached Yahoo and exposed more than 450,000 passwords, but Yahoo is to blame for making it easy.
The hackers say they were able to obtain the credentials through an SQL injection, a common attack method that gave Sony so much trouble in 2011.
The number of people streaming video and sharing files in the workplace has increased exponentially since November 2011.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.