The open-source Mozilla Foundation released the latest iteration of its Firefox Web browsing software on Friday, promising faster navigation, increased customization and improved security...
ANTI-SPYWARE
Anti-spyware solutions fall into three main categories at this time: dedicated anti-spyware systems, defenses integrated into anti-virus applications and gateway defenses for HTTP and...
Security researchers have traced Octobers W32/Sdbot-ADD worm attack against AOLs Instant Messenger network to a rootkit-powered botnet controlled by hackers in the Middle East.
With...
Its not engraved in stone or gracing the edifice of any corporate headquarters, but the following adage is well-established in the IT departments of...
Microsoft Corp. Thursday expanded the scope of its anti-phishing Internet software by announcing agreements with independent data providers Cyota Inc., Internet Identity, and MarkMonitor...
Microsoft late Wednesday confirmed a denial-of-service flaw in its implementation of the RPC (Remote Procedure Call) protocol and warned users that a working exploit...
Long before Mark Russinovich blew the whistle on Sony BMGs use of stealthy, rootkit-style techniques to cloak its DRM scheme, spyware researchers recall seeing...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...