BYOD breeds distrust between workers and IT
Nearly a third of US workers distrust company software on their mobile devices
John P. Mello | 10 Jul | Read more
Nearly a third of US workers distrust company software on their mobile devices
John P. Mello | 10 Jul | Read more
Best protection depends on walking a mile in hacker's shoes
John P. Mello | 09 Jul | Read more
State Attorney General report reveals some businesses reluctant to scramble data to protect it
John P. Mello | 03 Jul | Read more
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes
John P. Mello | 03 Jul | Read more
What sets this fruit-picture spam attack apart is that it appears to have involved hacked accounts, however
John P. Mello | 02 Jul | Read more
Social networking giant's data gluttony was exposed when the problem that left 6 million users' contact information exposed was fixed
John P. Mello | 24 Jun | Read more
Dozens of political and technology groups call for full accounting of online monitoring programs
John P. Mello | 12 Jun | Read more
Surveys find threat costs run into six-figure losses for many, and that adware is the most pervasive menace
John P. Mello | 06 Jun | Read more
Half of users running version two-years-old or older
John P. Mello | 05 Jun | Read more
Old tricks attract attention of cyber bandits in the first quarter, McAfee finds
John P. Mello | 04 Jun | Read more
Connection to Azure improves ability to push out near-real-time threat information welcome but called 'long overdue'
John P. Mello | 30 May | Read more
Specialized spam can be more than it seems -- it sets up a beachhead for malware mischief
John P. Mello | 29 May | Read more
Utilities' cyber defense efforts said to be rapped by legislators, Congressional report finds
John P. Mello | 23 May | Read more
Chinese cyber marauders sought more than just information on activists -- they wanted access to FBI, DOJ investigations on spies in the U.S.
John P. Mello | 21 May | Read more
Strongbox preserves anonymity at the price of authenticty
John P. Mello | 21 May | Read more