A long-overdue change
The Center for Digital Democracy has asked the FTC to investigate 30 U.S. firms' data collection practices, including Adobe, AOL and Datalogix.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
A flaw in Apple's popular music player allows for miscreants to execute remote code.
Apple on Monday released an updated version of its iTunes program to close a vulnerability that could lead to a man-in-the-middle attack.