Google's stealth updates: Why no one else gets away with it

August 23, 2011
How has Google managed to get users to accept its patches while other software vendors' updates are ignored or condemned?
Read more »

No contest: Mac vs. Windows security

August 16, 2011
Cloud computing, mobile technology, and Web 2.0 have altered the debate on whether Microsoft or Apple offers superior security
Read more »

The cyber crime tide is turning

August 09, 2011
Cyber criminals are facing more tech-savvy law-enforcement agents and harsher sentences
Cyber Crime
Read more »

Car hacks loom as autos go wireless

August 02, 2011
Tomorrow's vehicles will communicate wirelessly to reduce accidents, and experts are working to ensure hackers can't abuse the technology
Read more »

Stop pass-the-hash attacks before they begin

July 26, 2011
These tips can help you prevent attackers from getting to your password hashes -- because once they do, it's game over
Read more »

CSA helps clear up cloud security questions

July 19, 2011
Cloud Security Alliance provides guidance to help providers and customers make the cloud a safer place to compute
Read more »

Spammers exploit the Google cloud to dupe victims

July 12, 2011
Cyber thieves are luring victims to give up personal information using legit-looking forms in Google Docs
Read more »

Yes, even a mouse can infect your network

July 05, 2011
'Trojan mouse' was just a hint -- almost any hardware device that can be plugged into a computer can compromise its security
Read more »

In the IT security world, policies and controls are king

June 28, 2011
The SANS Institute's 20 Critical Security Controls document can help admins improve their organization's security defenses
Security
Read more »

The Internet needs its own Weather Channel

June 21, 2011
An Internet early-warning system would help organizations stay a step ahead of cyber criminals
Read more »
©1994-2014 Infoworld, Inc.