Microsoft officials warn of a problem that arises after users apply a DNS patch to Windows XP and 2000.
As attackers increasingly target browser flaws, the Firefox update scheme serves as a model for the industry
Firefox 3.0 release highlights the perils of information technology celebrity
A security researcher announces a new Threat Forecast service that aims to keep security chiefs at least one step ahead of the bad guys
With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.
Why the threat of theft-from-within is keeping enterprise CIOs up at night
IM attacks are on the rise, in part because organizations are deploying unified communications platforms without first hardening them against attacks
Report, covering late 2007, found a 300 percent increase in Trojan bugs.
During the first three months of 2008, security researcher Sophos identified about 15,000 freshly infected Web pages every day
Microsoft isn't the only vendor issuing security "<em>mea culpa</em>"s lately. Oracle and Apple got into the action last week, too.
A bevy of vendors -- including most prominent services providers -- have announced new payment card industry-oriented services.
The Global Internet Security Threat Report shows that as networks are more strongly protected, attackers have shifted tactics and targets.
Industry watchers speculate that the third service pack for Windows XP -- complete with security-related features -- could appear soon
Over 1,800 known cases of fraud result from data breach
New IT consumers are more comfortable with, and knowledgeable about, technology, and that’s a problem
The Web 2.0 paradigm shift is fraught with both promise and danger
Microsoft’s Trustworthy Academic Advisory Board has been keeping tabs on security issues -- external as well as internal -- that continue to challenge Microsoft’s developers. We take a look at the board, which is now five years old.
Sleeping laptops may be the next way hackers steal encrypted information
ID theft usually involves time-tested methods such as telephone fraud than blockbuster data breaches
The number of new vulnerabilities disclosed by researchers actually declined in 2007 -- the first time that’s happened since 2003 -- but it’s not all good news.