Microsoft published a workaround for an in-the-wild vulnerability in Internet Explorer 6 and 7, described last week.
Researcher says read the fine print before connecting to the cloud.
A Microsoft-funded report found that IE 8 outperformed four other browsers in protecting against socially engineered malware.
The heavyweight lineup of government representatives at last week's RSA Conference raised many questions -- but few answers -- about how best to fight cybercrime.
The Cloud Security Alliance on Monday released the results of a security study identifying the "seven deadly sins" of cloud computing.
Cloud computing has the ability to transform IT , but its success depends on security, said Art Coviello on Tuesday in his opening keynote.
The speaker lineup at this year's annual RSA Security Conference and Expo, underway this week in San Francisco, is packing some serious federal heat.
Cisco announced its Secure Borderless Network architecture, which the company is positioning as a reconceptualization of enterprise security.
Microsoft described a zero-day vulnerability involving some older Windows versions and VBScript when used with Internet Explorer.
A new study describes the top 25 programming errors that can open up security holes in software.
VMware last week teamed up with Cisco and NetApp to promote a virtualized datacenter offering geared toward shared or public cloud environments.
Support for Internet Explorer 6 appears to be dwindling after Microsoft's Web browser was exploited for well-publicized attacks on Google and other companies.
Microsoft issued a cumulative "out-of-band" security patch on Thursday for a bug in all versions of Internet Explorer.
All eyes tend to focus on Microsoft's monthly patch cycle, but don't forget Adobe.
The !exploitable Crash Analyzer is designed to help developers classify, assess and ultimately prevent program crashes.
The BSIMM maturity model sheds light on how enterprises are implementing security initiatives in their internal software development efforts
A newly released maturity model could be the first to shed new light on how enterprises are implementing security initiatives in their internal software development efforts.
Search engine optimization techniques are being used to divert Web surfers to malicious sites.
A March DNS security patch doesn't work on compromised servers, according to nCircle.
Adobe Reader 9 bug allows for remote exploitation by hackers.