Phishing attacks are getting scarily sophisticated. Here's what to watch out for
Phishing campaigns use fake social media profiles, in-depth research, and more to trick unsuspecting victims into clicking malicious links.
Phishing campaigns use fake social media profiles, in-depth research, and more to trick unsuspecting victims into clicking malicious links.
Government claims that a new data policy will allow innovation and economic growth, but privacy experts are sceptical and warn it could result in less privacy protections for consumers.
The tech giants are in Washington to talk about Russian 'disinformation online' and to discuss solutions for fighting it.
The Target breach case has the potential to define who has to write the checks to pay for the cleanup following a major breach.
The pain isn't remembering passwords, it's having them stolen
A researcher warns that a hybrid worm could be spun off Sasser, as companies are told to include the money spent cleaning up such attacks in the cost of owning technology.
It was a lost weekend for IT managers who fought the macro withonly scattered success.