Criminalizing the Crime: Punishing Data Theft
A convicted hacker in Turkey received a 334-year sentence for data theft, while a UK official calls for stronger sentences there.
A convicted hacker in Turkey received a 334-year sentence for data theft, while a UK official calls for stronger sentences there.
Today marks the end of support for Microsoft Internet Explorer versions 8, 9, and 10. What does this mean for browser security?
Halloween is almost here – while this weekend will be full of ghosts and ghouls, the threats that may already exist in your IT environment can be even scarier. Here are the top threats that could be lurking in your environment and how to defend against them.
The claim by a self-described teenage “stoner” that he was able to compromise the personal email account of CIA chief John Brennan underscores the huge cultural challenge that even security-conscious organizations face.
Are your social media habits putting your private data - or your company's - at risk? Learn about the risks of oversharing and get tips for using social media securely in this infographic.
Manipulating sound waves to open a vector for data exfiltration seems like the stuff of science fiction - but based on recent research, the technique is quite plausible.
The research firm Binaryedge says it found more than a petabyte of data stored in high performance databases like MongoDB is exposed to the public Internet.
Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
We asked 34 data security experts how companies can best communicate the security risks associated with file sharing and cloud storage to employees - see what the experts had to say.
With the end of Windows Server 2003 support fast approaching, companies must act now to migrate systems where possible and secure legacy systems.