Security researchers at Trend Micro Inc. have pinpointed RSS (Really Simple Syndication) technology as a lucrative target for future bot worm attacks.
David Sancho, senior...
Among the challenges that enterprise administrators face when attempting to properly lock down the Windows machines in their care, managing the laundry list of...
Sony BMG Music Entertainments use of a rootkit to hide its digital rights management software deep and undetectably within the operating system of users...
Keylogging programs are the epitome of online stealth, and theyre also a mushrooming problem on the Internet, where identity and intellectual property thefts are...
Symantec Corp. will discontinue sales and support for customers who bought personal security products from Sygate Inc., which Symantec purchased in October.
Symantec is shelving...
The European Commission last week adopted measures that will help fight terrorism and serious crime by opening up development of, and access to, common...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...