13 IT security myths
Some generally-assumed and oft-repeated notions about security may not necessarily be true and we asked security experts to tell us their favourite security myths and what they think of them.
XOR.DDoS is distributed through SSH brute-force password guessing attacks
Google's new reverse proxy offers a shields of sorts - but only for some
One of the two largest attacks ever recorded hits Chinese gambling firm