Prepare yourself for high-stakes cyber ransom

July 01, 2014
A cloud startup was obliterated overnight by malicious hackers demanding ransom. Now everyone is a target. Here's your best defense
Read more »

The quantum cryptography arms race has begun

June 24, 2014
Quantum computing may be taking its time to arrive, but when it does, encryption won't be the same again
Read more »

Stop sneaky hackers from launching DMA attacks

June 17, 2014
Traveling to cyber spying hotbeds? Then beware of hackers compromising your system via DMA attacks
Read more »

Nowhere to hide: The reign of cyber criminals is coming to an end

June 10, 2014
Law enforcement is catching the modern-day Bonnies and Clydes on a regular basis
Cyber Crime
Read more »

5 lessons from companies that get computer security right

June 03, 2014
Computer security is in tatters -- but not everywhere. Learn from the companies that know what they're doing
Read more »

5 ways computer security has truly advanced

May 27, 2014
Security isn't all gloom and doom. Amid the progress today, these four developments in particular have made us safer
Read more »

6 things security pros keep getting wrong

May 20, 2014
Nobody's perfect -- especially computer security professionals. Fortunately, there's a pattern to the mistakes. Here are some of the most common ones to watch for
Read more »

Want 'perfect' security? Then threat data must be shared

May 13, 2014
Today we have all kinds of organizations tracking various slices of the threatscape. A concerted effort to pool all that data would form a new bulwark against attack
Read more »

Don't let the latest zero-day fool you

May 06, 2014
The Internet Explorer exploit patched by Microsoft last week was serious stuff, but, if you're prioritizing holes to plug, browser vulnerabilities shouldn't be first on the list
Read more »

5 takeaways from Verizon's 2014 Data Breach Investigations Report

April 29, 2014
If there's one security report you should read every year, this is it. Trends include rising corporate espionage, more frequent ATM compromises, and improved hack detection
Read more »
©1994-2014 Infoworld, Inc.