Among the information being requested is the the types of personal information being collected and the purpose for which it is being used.
Articles by Kara Reeder
Christopher Allen Lewis got enough information over the phone to take down Comcast's Web page for two days.
3Com announces the TippingPoint vController, the 1500S SSL Appliance and the H3C S9500E modular switch chassis.
A Symantec survey shows that 75 percent of respondents were victims of cyber attacks.
Once Chuck Norris installs itself in the router's memory, it blocks remote communication ports.
The critical flaws are in Firefox 3.5.8 and Firefox 3.0.18.
Google says it is aware of the vulnerability and is working on a fix.
The theft occurred after a phishing scam tricked an EMI employee into supplying the crooks with the company's online banking credentials.
Two of the bugs could allow an attacker to view sensitive system administration details.
Google has paid researcher Timothy D. Morgan for discovering three high-risk vulnerabilities.
Spy Eye's 'Kill Zeus' option is the most aggressive crimeware, says researcher.
Compared to the fourth quarter of 2008, spam rose 35 percent.
The flaw affects WebLogic versions 7 and higher.
The add-ons were infected with Trojan horses.
Once installed, the file could allow hackers to redirect all traffic through a server of their choosing.
America's hotel industry was a favorite target for cyber criminals in 2009.
The sophistication of the attack indicates that it was likely carried out by a national government.
A fake virus warning is being distributed via e-mail.