Identity theft could be costing the government billions of dollars a year in fraudulent tax refunds, and it is hard to say whether the shift to electronic tax filing is a boon or a bane.
The House of Representatives has ruffled feathers by banning a peer-to-peer music network, but P2P raises security concerns that merit caution.
It's easy to forget that the Internet relies on physical infrastructure that can break. Not every disruption is an attack.
After more than a decade, the Federal Information Security Management Act could use some updating, but Congress should take the time to look at what really has worked.
Distributed denial-of-service attacks are becoming more common, more powerful and the botnets that support them more resilient.
Once again admins are being advised to disable Java in the wake of a new vulnerability. It's time to decide how important this plug-in is to your enterprise and when -- if ever -- it should be used.
A new study of the evolving cyber threat landscape identifies a half-dozen areas likely to be high-profile targets in the immediate future, including something called "trust infrastructure."
Today's systems, policies and procedures were developed to lock information down, not to share it securely. Interoperable credentials could be the key.
New technology doesn't define the cyber threat landscape, say researchers crunching numbers from eight years of Verizon Data Breach Investigation Reports.
The Trojan Upclicker evades automated detection tools by monitoring mouse activity to make sure it is dealing with a human before jumping into action.