Microsoft has applied an update to its Xbox360.com Web site to address a cross-site scripting vulnerability that could have been exploited by phishers to...
A high-risk buffer overflow vulnerability in Computer Associates International Inc.s eTrust Vet anti-virus engine could put users at risk of PC takeover attacks, the...
America Online on Tuesday confirmed the inadvertent suspension of an undisclosed number of Trojan-infected AIM screen names.
The company said its internal anti-SPIM (spam over...
A high-profile security research outfit on Tuesday warned that a newly discovered flaw in the Domain Name System protocol could be exploited remotely to...
New Boundary Technology Inc.s Policy Commander automates what can be the overwhelming manual task of maintaining security settings on Windows desktop, laptop and server...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...