The company is enhancing three to work together, resulting in an "always on" VPN, plus beefed up client protection. But two industry analysts say the plan leaves a lot of questions
Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills, they can simply order botnet attack services from cybercriminals
Analyst John Pescatore predicts cybercrime as a service with the rise of botnets and employees relying on networks and devices not owned by their companies
The U.S. Defence Department still lacks a common architecture for a unified biometrics capability but it continues to test DNA, fingerprint, facial images and iris scan technology ID management...
The CTO of one registry service provider has seen 250,000 domain names taken down due to malicious use. A McAfee expert speculates on why so many have a connection with Chinarn
Sourcefire 3D System 4.9, now in beta, can be used to inspect traffic between two physical hosts, two virtual machines or between a physical host and a virtual machine