This ad will close in 20 seconds. Continue to site »
Windows 10 Redstone: A guide to the builds
Excel 2016 cheat sheet
! Here are the latest Insider stories.
For enterprise protection, antivirus software is no longer enough
Read CW’s May digital magazine!
How Veritas is getting its cloud on
Buyers’ Guide: Prices dropping for data visualization software
Suggestions for you
All Cloud Computing
All Computer Hardware
Solid State Drives
Consumerization of IT
All Consumerization of IT
Bring Your Own Device (BYOD)
All Data Center
High-Performance Computing (HPC)
All Emerging Technology
Internet of Things
All Enterprise Applications
Business Intelligence (BI)
Enterprise Resource Planning (ERP)
Software as a Service (SaaS)
Unified Communications (UC)
All IT Management
IT Project Management
IT Skills & Training
Technology Law & Regulation
Mobile & Wireless
All Mobile & Wireless
Mobile Device Management
Windows 10 Mobile
All Operating Systems
Cybercrime & Hacking
Malware & Vulnerabilities
All Vertical IT
Financial Services IT
Small Enterprise IT
Michael Kan covers security for the IDG News Service.
The Latest from Michael
'Kill switch' helps slow the spread of WannaCry ransomware
Ransomware attack spreads worldwide using alleged NSA exploit
A ransomware strain appears to be spreading worldwide, by leveraging a hacking tool that may have come from the U.S. National Security Agency.
Trump's cybersecurity order pushes U.S. government to the cloud
President Trump has finally signed a long-awaited executive order on cybersecurity, which calls for the U.S. government to move to the cloud and modernize its IT infrastructure.
Patch to fix Intel-based PCs with enterprise bug rolls out this week
PC makers will roll out a patch this week that fixes a severe vulnerability found in certain Intel-based business systems making them easier to hack.
Google Docs phishing scam underscores OAuth security risks
Google has stopped Wednesday’s clever email phishing scheme, but the attack may very well make a comeback.
Sneaky Gmail phishing attack fools with fake Google Docs app
Google Docs was pulled into a sneaky email phishing attack that was designed to trick users into giving up access to their Gmail accounts.
Vulnerability hits Intel enterprise PCs going back 10 years
Intel is reporting a firmware vulnerability that could let attackers take over remote management functions on computers built over the past decade.
NSA ends surveillance tactic that pulled in citizens' emails, texts
The U.S. National Security Agency will no longer sift through emails, texts and other internet communications from U.S. citizens that mention foreign targets under surveillance.
Ransomware attacks are taking a bigger toll on victims' wallets
Hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the notorious infection rose to $,1077, up from $294 the year before, according to cybersecurity firm Symantec.
Old Windows Server machines can still fend off hacks. Here's how
Keeping a computer up to date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.
There's now a tool to test for NSA spyware
Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.
Hackers use old Stuxnet-related bug to carry out attacks
Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.
Sign up and receive the latest news, reviews and trends on your favorite technology topics.
Get our daily newsletter
Accelerate Healthcare Transformation and Clinician Workflows with a Secure Digital Workspace
Beyond Perimeter: Detecting Ransomware and Aberrant User Behavior
How to Fuel Innovation Through Hidden Cost Savings
Leveraging Vulnerability Management for Enhanced Security
Manage Your IT Estate in 5 Weeks or Less with CloudScape Pro