Phoenix Suns have to dedicate resources to screening and eliminating expressions of virulent hate or verbal abuse coming in via Facebook and other sources.
As cyberattacks increase, victims are fighting back. But retaliation has its own consequences--and may create more damage.
A change in the email system has let some dangerous spam show up in inboxes. Action plan: Stay alert for evidence that employees have fallen victim to phishing attacks.
The DoT’s CERT team has successfully censored more than 70 URLs that didn’t particularly contain praises of IIPM. Amusingly, a URL containing a public notice issued by the University Grants Commission (UGC) in July 2012 was also blocked.
Enduring a flood that wipes out your production facility is worse than losing some stored baby pictures, but disaster planning is essential for individuals and businesses of all shapes and sizes.
IT security threats are constantly evolving. It's time for IT security pros to get ingenious.
If you suspect that malware may have compromised your computer, head to Facebook's new 'malware checkpoint' where you can ensure your system is clean and virus-free.
Maxim Mitrokhin, Director-Operations, Kaspersky Lab, APAC, talks about the company’s aspirations for the Indian market.
During his recent visit to India, Ashar Aziz, founder of security vendor FireEye, spoke extensively to CIO Magazine on why it has now become imperative for Indian CISOs to align with their company’s vision to fight next-generation threats.
Keeping IT one step ahead of expansion plans at independent grocery chain Drakes Supermarkets is CIO Rod Koza's remit for 2013.
There's nothing you can do it hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking.
Members of the European Parliament conclusively rejected the controversial Anti-Counterfeiting Trade Agreement on Wednesday. In a vote hailed by digital civil liberties groups as a huge victory for citizens, the bill went down by 478 votes to 39.
New mobile phone app takes aim at privacy-changing apps, conducts new app searches based on 'certified' level.
The attack infected computers belonging to companies, governments and other organizations from over 100 countries, Trend Micro says
Microsoft has noticed that viruses -- which have been present on around 5 percent of the computers the company regularly polls -- have increased in prevalence in some regions, wrote Tim Rains, director of the company's Trustworthy Computing section.
With the new networking method, devices are able spot a problem unit and then isolate it from the network before it can do any damage
Symantec's recently announced reorganization and strategic shift point to a tenuous few years, as employees will be asked to do more with less in the name of keeping shareholders--including the CEO--happy. This is usually a good sign that it's time to polish up your resume.
What’s the point of the government's UID project? It is neither unique, nor does it provide an ID. It only fuels the government’s Big Brother ambitions.
The most recent zero-day exploit is the latest evidence suggesting that client-side Java is past its prime, not to mention dangerously insecure. It's time for consumers and enterprises to pull the plug on Java before Oracle sells it off and leaves it for the vultures of cyberspace.
From Apple, to Symantec and Anonymous, lots of people, companies and groups influence the IT security world.
Tech giants have thrown their weight around to get what they want for years. Here's a look at some of the big tech companies that have been caught indulging in boorish behavior.
Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory.