Much has changed over the past 20-odd years. Anonymity is no longer the web's hallmark: internet users' readiness to share personal data has created a bonanza for marketing companies and other businesses, who rapidly found ways to mine this information

One of the best ways to keep mobile apps safe is to secure the services they connect to. Here are the techniques mobile developers can use to better secure their apps

A recent Pew Research survey finds that most internet users would like to be anonymous online, but many think it is not possible to be completely anonymous online. Some of the key findings

Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Robert Watson explains the threats and how to mitigate them


  • Officials say hackers pose a threat to the nation's economy and accuse China of carrying out the most cyber-attacks. Some estimates put the cost to the U.S. economy at tens of billions of dollars each year

  • Social media giant Twitter says it was hacked recently, in a sophisticated cyber attack that exposed the passwords and other information of about 250,000 users

  • Computer crime could soon pose a greater threat to world security than terrorism. Our author analyses the problem and looks at the ambivalent attitude of states towards countering it

  • Much of the global cyber threat -- whether this is to critical infrastructure, the economy or the security of individuals -- takes the form of attacks on organizations outside government control

  • Hackers have found a new target in Microsoft. The software giant experienced a similar cyberattack when a small number of its computers were subject to malicious software

  • Android, Google's mobile operating system, is a target for mobile malware according to a report recently compiled by Blue Coat Systems

  • How to deploy encryption when its performance might otherwise be impractical

  • Here's how enterprises and developers should be rethinking their assumptions about Linux platform and device security

  • My 79-year-old father looked at me through tears of frustration, staring at his PC. In just 24 hours, he had been shunned by dozens of people who, up until now, he thought were his friends

  • Author of controversial cyber espionage bill says it would let U.S. stop predators, not spy on its own

  • Employees using their own smartphones for work? Here's how to cope, says this mobile expert.

  • Business schools train grad students to handle security breaches and protect customer data

  • Do you know where your data is? For your company's safety, it's critical to know how employees are using the cloud

  • Cloud computing provides numerous benefits, including cost savings. Here's how to avoid creating security risks in the process

  • Russia currently holds the dubious distinction of being the world's top source of Internet attack traffic. Russian-based IP accounts drive 10 percent of attacks, most of which target port 445.

  • A new botnet called TDL-4 might be indestructible, according to security researchers at Kaspersky Lab

  • As long as consumers take a few basic steps to help protect their information, security experts agree that online banking remains safe. Here are 10 steps consumers to take to make sure their information is safe

  • The prolonged PSN downtime was a result of hackers, and consequently Sony announced that everyone's PSN screen name, real name, address, email, birth date and password had been compromised.

  • Near-field communication, while not new, is becoming a hot buzzword among tech-savvy consumers and businesses alike. This short-range wireless radio technology can turn a smartphone into a digital wallet, but that's just one of many potential uses

  • When it comes to social malware, you're only as secure as your most gullible employee. By now, even the most gullible employees will probably not fall for email-based phishing schemes. But social media, thanks to its newness, is another story

  • Thanks to their small size, low cost, and capability of instant backup and file transportation between multiple computers, USB drives actually pose significant security threats for businesses. You should take several precautions to minimize the risk of data theft or malware attacks via USB drives. Consider the following

  • We have been monitoring cloud offerings for a while now, and when I stepped down as CIO in December, we were planning to get our toes wet by moving our Microsoft Exchange email services to the cloud. We're still very cautious about moving any customer financial service systems to the cloud or integrating our offerings into legacy financial services systems that house customer data

  • An effective data security policy is critical now more than ever, as data is increasingly stored in a variety of devices. To prevent theft of sensitive assets, it's critical to follow security best practices and adhere to a set data security policy. Here's what to consider when creating one for your company

  • The days when social networks were just for teens are long over: Adults now take up social networking for fun and business alike. To get the most out of your favorite social networks, it's important to be aware of how to protect your online privacy. Here's how to share safely

  • Who is to keep cyberspace safe? Should governments bear the burden and what can society do to protect against virtual threats?

  • Washington moved into damage-control mode, as news organizations published explosive excerpts from a trove of 251,287 stolen State Department cables published by the website WikiLeaks. WikiLeaks founder Julian Assange justified the publication with claims that the archive shows that the United States is duplicitous in its dealings with the world

  • If you get an E-mail from the IRS asking you to visit a website because of a problem with your tax return, ignore it: It's a scam. Reports of this kind of 'phishing fraud' have popped up throughout the country in recent weeks. Here are six ways to keep your identity safe and avoid 'phishing fraud'

  • In 2008, the U.S. Department of Defense suffered a significant compromise of its classified military computer networks. This previously classified incident was the most significant breach of U.S. military computers ever, and it served as an important wake-up call. The Pentagon's operation to counter the attack, known as Operation Buckshot Yankee, marked a turning point in cyberdefense strategy

  • Developers unite software and hardware-based security to reinforce laptop, web site defenses

  • Structured Query Language is one of the most popular ways hackers attack enterprises. Programmer and trainer Paul Litwin tells you how to identify weaknesses before hackers do

  • The potential threats against the United States from malicious foreign hackers are as poorly understood as they are scary. It's the kind of shadowy, nonstate threat that the U.S. defense and intelligence bureaucracies are traditionally ill equipped to fight.

  • A level of vulnerability has been introduced into our way of life that is unprecedented. We now have a smaller connected globe where information can be moved in seconds, where information managed by computer networks -- which runs our utilities, our transportation, our banking and communications -- can be exploited or attacked in seconds from a remote location

  • The Obama administration recognizes that the United States is utterly dependent on Internet-based systems and that its information assets are precariously exposed. Accordingly, it has made electronic network security a crucial defense priority. But that is only the tip of the iceberg.

  • A carefully crafted information-sharing program that includes robust privacy safeguards could be an effective approach to cybersecurity, CISPA lacks such protections for individual rights

  • There is a need for cybersecurity legislation, but CISPA -- an overly broad bill that lacks restrictions on government abuse -- is not the right way to achieve it

  • CISPA represents the best, most flexible, and effective approach to developing a more robust and responsive cybersecurity infrastructure

  • A chief officer with a leading cybersecurity company says hackers are rapidly setting their sights on Android, and it could cost users thousands of dollars in unwanted text messages

  • Multicore processers are increasingly common in everything from PCs to smartphones -- and increasingly attractive to hackers. Robert Watson explains the threats and how to mitigate them

  • Here's how security experts combine hardware and software techniques for a new layer of protection

  • Data breaches threaten not only your customers' information, but your company's reputation too. Here's how to create a strong security policy to protect stored data

  • You might not face the same scrutiny as Apple when it comes to customer privacy, but you still have to plan, says data security expert Tsahy Shapsa

  • Here's what you need to do to keep your data safe when you're connecting to the cloud via free public Wi-Fi

  • If your home office is your work headquarters, then the Web is the key to your success. Check out these strategies to secure your devices to prevent data loss and virus invasions

  • Free Wi-Fi connections can be tempting for traveling employees. And hey, you can't blame them, as one less item on an expense report can make them look better -- especially if your company is tightening its belt. But talking to them about the risks can help protect them -- and you

  • You're ready to drive that new minivan off the lot when the salesperson gives you the bad news: You didn't qualify for the loan. He shows you your credit report with numerous unpaid accounts. Until today, you thought you had perfect credit. Sounds scary, but don't pull the plug on your computer just yet. You can reduce the risk of online identity theft by taking these steps

  • Consumers now buy more laptops than desktop PCs, relishing the power they pack in a portable package. Thieves relish laptops for the same reason. The overwhelming majority of lost or stolen notebooks don't make it back to their owners, according to FBI and analyst reports. But a few laptop-luggers take steps to protect their investments, or the even-more precious data they contain.

  • Scammers are getting creative, moving past the good ol' 'stuck-in-Nigeria-need-money' scam. Here's how to stay ahead of them

  • New research shows the increasing dangers kids face online. Here's how you can help

  • Your biggest security threat might already be inside your firewall, says expert Chip Tsantes. Here's how to combat insider attacks

  • Given the growing popularity of smartphones and tablets, criminals' interest is increasing too, bringing with it a bigger threat of loss, theft and exposure to viruses and malware. Fortunately, there are plenty of security measures you can take to stay safe. Check out these five strategies -- and corresponding apps -- to help you carry them out

  • The litany of breaches, thefts and damage continues with ominous regularity, but why is cyber security such a difficult arena in which to make progress? Is it something that can be solved or must we learn to accept a measure of insecurity?

  • Google's much-hyped Chrome OS notebook is just a few months away, promising to deliver a lean, minimalist approach to mobile computing. Fast startup time, long battery life thanks to lower power consumption, and a heavy emphasis on cloud computing add up to plenty of interest from businesses of all sizes. But will this new operating system mean fewer security headaches?

  • Good security controls are vital, and we work daily to advance ours. First and foremost, we recognize the high risk of mobile devices and take steps to encrypt laptops, tablets, desktops and mobile phones. We also have a set security plan in place to prevent data breaches and ensure safety

  • For the most part, shopping online is as safe as visiting your local mall. But every year, thousands of customers run into online scams. Researching companies in advance, even through a simple web search, can help people avoid such traps. Here are nine tips to keep you from being a victim

  • Apple products no longer get a pass when it comes to security. Here's how to ensure iPhone and iPad security in your company

  • The cloud's features we love most also leave our families vulnerable, but you can use the cloud without compromising your privacy.

  • James Lewis at the Center for Strategic and International Studies says cyberattacks are a cause for concern; expert Marcus Ranum argues that we should focus our security efforts elsewhere. Your feedback

  • Buried inside hundreds of pages of heavily redacted court documents from the case of a man accused of being one of al Qaeda's chief recruiters, is evidence that the terrorist group has launched successful cyberattacks, including one against government computers in Israel. This was the first public confirmation that the terrorist group has mounted an offensive cyberattack.

  • We have at least two opponents with the ability to launch damaging cyberattacks against the United States -- Russia and China. They have probably done the reconnaissance and planning necessary for these attacks, probing American networks for vulnerabilities. But they have not launched them. Why not?

  • Suddenly, the steady drumbeat of computer network security has been pushed to center stage, and now our government is talking about cyberwar and pointing a finger at China. Unless you've been asleep for a decade, you ought to be worried when our government starts using the rhetoric of warfare -- especially vocabulary like pre-emptive and deterrence. Why the sudden change?

  • The e-mail said it came from CareerBuilder and offered a job opportunity as a 'trading assistant.' Just one hitch: It wasn't an e-mail from and it was not a job. It was part of a cynical scam that's becoming widespread. This scam is just part of an evolving cacophony of employment frauds that prey on the millions of Americans who are out of work.

  • The two-day 'Cyberdawn' exercise, one of the country's premier electronic war games. It is run with the help of volunteers by the private firm White Wolf Security, which also arranges closed war games for some federal agencies. The chance to test their cyberskills has attracted groups from private companies as well as the U.S. military