Put down the vendor white papers and turn down the volume on that webinar. If you want to secure your data and pass a PCI audit, take a look at the past -- the long-ago past. Between the ninth and 15th centuries, the castle was the Western world's emblem of strength and security. It enabled small vi...
New-age warfare is here. Governments and Internet security firms are quietly gearing up for the potential onslaught. Don't think that cyber warfare is merely fuel for novel writers. Cyber attacks are being waged in increasing numbers. Computer network attacks are often perpetrated by gangs of crimin...
For enterprises, the primary reason for adopting Voice over Internet Protocol phone service is money. Long-distance phone calls placed over the Internet typically cost a mere fraction of those placed under the business rate plans offered by traditional telephone companies. As a result, the business ...
Internet service providers that serve advertising when a user requests a Web page that doesn't exist are exposing their users to a giant security breach, according to security researcher Dan Kaminsky. The vulnerability resulting from the practice, which is an increasingly common way for ISPs to make...
WiFi features are as standard on today's portable computers as built-in modems used to be. Laptop users have become accustomed to the ability to connect to the Internet from practically anywhere to reach e-mail, Web sites and music download portals. Consumers even use wireless routers to connect to ...
Five years after it began work on Singularity, an operating system research project focused on constructing dependable systems, Microsoft has released a research development kit to the academic and research community. The terms of the license make Singularity free software, not open source software....
The precarious nature of data security -- and accounts' vulnerability to hackers -- came to light Wednesday when Finjan said it had found a cache of more than 8,700 stolen File Transfer Protocol server credentials. The stolen account information, containing usernames, passwords and server addresses,...
What's most important to consumers when making a purchase online? Personal identity. Consumers are taking more notice of their individual online security after a string of recent identity theft cases made major headlines. According to a recent survey by University of Southern California's Center f...
The Cult of the Dead Cow hacker group -- which claims to be the world's most attractive hacker group -- has released Goolag Scanner, an open source tool that uses Google's search engines to look for vulnerabilities in Web sites. Goolag Scanner is either a Web auditing tool that can be used by securi...
A new study suggests that dynamic memory on computers stores encrypted, secure data longer than originally thought. The research project -- conducted by eight researchers from Princeton University, the Electronic Frontier Foundation and Wind River Systems -- focused on retrieving encrypted data from...
Daily
Several times a week
Occasionally
Never
I can't tell when apps use AI
Enter your Username and Password to sign in.