There are more than 25 million improperly configured DNS servers out there. Could your company’s be one of them?
Do you have a malware problem? Here are seven warning signs that your PC's security has been compromised by some nastiness or other.
Somebody has taken over your email or social media accounts. All your friends are mad at you. How can you recover from this?
CAPTCHA prevents scammers from creating millions of fake accounts, although it's a pain for us humans. But what alternatives exist?
Security Essentials has bombed in another antivirus test, and the application is starting to look shakier and shakier.
Java is a cross-platform language that's been mightily abused by hackers, and many security experts now advise disabling it.
Most comparative antivirus tests use older malware samples. What happens when the programs come up against freshly released malware?
Are you always getting called on to fix a friend’s computer? It’s a good idea to be prepared with a security toolkit on a USB drive.
We look at the latest report from AV-Comparatives which considers how well antivirus products manage to clean up infections.
A Chief of IT Security shares his thoughts on a shift away from protecting devices to protecting data at the Malware 2012 conference.
DTL holds entirely unsponsored security suite trials, and here’s an in-depth look at the results of its first report to be made public.
Identity thieves and other miscreants could take advantage of your Facebook profile if it’s too open – so make sure you lock it down!
How good is mobile security software? It’s pretty effective in general, according to this latest study of big name providers.
As major hacks and data breaches become more commonplace these days, a properly secure password really is a must.
Symantec’s Security Technology and Response (STAR) team have filled us in with their findings on recent major threats.
The latest investigation published by NSS Labs is illuminating and alarming, with many top-rated AV suites falling short.
MS is serious about security in Windows 8, implementing vastly improved protection of low-level activities such as memory allocation.