Over the last few days, a new worm, Linux.Plupii, which attacks Linux systems via Web-server related services, has made its appearance.This worm, also known...
Microsoft Corp.s Windows AntiSpyware technology has been renamed "Windows Defender" and has been expanded to detect and remove rootkits, keystroke loggers and other forms...
A public official in Westchester County, some 30 miles north of New York, has proposed legislation that would require businesses that collect customer information...
Michael Lynn, the security researcher who made international headlines in July for blowing the whistle about a major hole in Cisco Systems Inc.s software,...
Multiple security flaws in Apple Computer Inc.s QuickTime media player could put users at risk of code execution attacks, the company confirmed in an...
Anti-virus software has always lived with the tradeoff of performance versus thoroughness. Its led to some software design decisions on the methods of how...
Botnets are big business—at least according to authorities who announced the first U.S. case against an alleged computer hacker, who authorities believe netted $60,000...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...