Exploits using Windows XP as an attack vector will grow this year, according to security experts commenting on Microsoft's "Security Intelligence Report Volume 8"
Dell is warning many of its customers of potential malware embedded in a set of server motherboards.
As Adobe Systems applications face increasing security threats, Microsoft is stepping up to lend a helping hand.
The malware calm in the midst of a raging spam storm was almost eerie. Until last month, that is, when things took a turn -- for the worst.
How to ensure security is part of the cloud adoption strategy.
Microsoft issues security advisory about Windows vulnerability associated with shortcut icons on USB drives
The majority of Internet security threats come from unpatched vulnerabilities in Adobe Acrobat/Reader and Microsoft's Internet Explorer browser.
Recommendations for making data safer that won’t decimate your IT budget.
Three updates rated "critical," one deemed "important."
Microsoft plans to release four software fixes on Tuesday in its July security update
With World Cup-oriented attacks and a brazen tech-support-by-phone scam, it's business as usual for the ever-creative information security crackers.
Breaches are targeting application because that's where the data is.
Twitter agreed to settle Federal Trade Commission charges that it put consumer privacy at risk.
How IT can address the challenges of Active Directory
Microsoft today issued a new security advisory on a Windows help function flaw
Mobile security products fared better than did the broader security market in a very tough 2009. Look for that trend to continue.
Moving your data to the cloud is not without risk. Here's what you need to know about securing your data.
Microsoft has confirmed that it has been working with a security firm investigating a fundamental flaw in antivirus (AV) software for Windows.
When it comes to securing the increasingly virtualized systems of the 21st century, IT seems to be stuck in 20th-century mode.
Compliance efforts will also affect the security of your data. We explore the connection and what IT can do to protect its information assets.