The algorithm used in one of the most debilitating e-mail worm attacks in history has been cracked, allowing virus researchers to accurately predict the...
Microsoft Corp. has announced plans to make several key default changes to Internet Explorer 7s security zones to further harden the browser from malicious...
Whats the retail value of a security vulnerability in Microsoft Corp.s Excel spreadsheet program? At last check: $53 and counting.
An unknown security researcher chose...
The sharp rise in rootkit detections on Windows machines is a direct result of adware/spyware vendors using sophisticated techniques to hide processes and prevent...
Managed e-mail security and management providers are launching new services to help businesses archive electronic communications as they seek to comply with regulatory and...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...