News and Articles About Security
Phones are off the radar for most hackers today. But Google's Android OS and the iPhone could make them more of a target.
As your business gets more dependent on technology, your computer becomes more targeted by hackers and others constantly on the prowl for vulnerabilities.
Asking about your mother's home town is supposed to help legitimate sites protect your online accounts--but experts say hackers know more about you than you might think.
We've all run into obnoxious people on the Internet. But these are the kinds of idiots who make you feel like logging off permanently.
If you run a small business, your biggest IT worry is probably not when or whether to upgrade to Vista; it's how to keep your valuable equipment--and the even more precious data it contains--out of the hands of thieves.
Don't give up on the biggest auction marketplace because of fears of fraud. Here's how to buy and sell without a hitch.
We check out eight products, from the popular to the relatively unknown. They can't protect you from everything, but some come close.
BitDefender was an excellent performer among security suites, but it's best for experts who don't need guidance regarding security extras and pop-up alerts and who don't mind therough interface.
The Trend Micro security suite combines a good feature set and solid malware disinfection, but those benefits are offset by below-average detection as well as interface and installation bugs.
Symantec's Norton Internet Security 2008 suite offers solid security protection and features, including the best behavior-based defense against unknown threats.
These downloadable programs, most of which you can try before buying, can save you when disaster strikes your desktop or notebook.
Turn your PC on, and you're immediately vulnerable to malicious attacks. But you can use these free applications to minimize the dangers and protect yourself.
The tool is designed to inform users when their applications need patching.
Webcams and IP cameras let you keep an eye on your property while you're away.
Follow these steps for protecting IM as a business tool.
Take these steps as soon as a virus penetrates your network to minimize damage.
Keep data safe by shredding storage media.
You're wasting money if you don't have a system in place for digitally storing the millions of pages of documents and files your business produces. Here's the lowdown on digital archiving.
Spammers are getting smarter in the ways they try to con your business. It's time to do some homework so you can outsmart them and protect your company from attack.
To successfully secure your systems, focus on the procedures, not the technologies.
It's often the internal, not external, threats that pose the greatest risk to your network. Are you prepared for the worst?
How much should you spend this year?
Few know as much about your IT security as your employees and former employees do. Here's how to safeguard your technology from the inside.
Worried about protecting computer data? With a tape backup drive, your worries may be over.