Paranoia rules! 5 types of imaginary malware

Paranoia rules! 5 types of imaginary malware

Computer security attracts all sorts of skeptical personalities. A little doubt is healthy; a lot may mean you should seek professional help

08/23/16

6 security advances worth celebrating

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

08/16/16

SHA-2 shortcut: Easy certificate management for Linux

SHA-2 shortcut: Easy certificate management for Linux

Due to the rollover from SHA-1 to SHA-2, a ton of digital certificate work is needed. With CertAccord, it's as easy to do on Linux as on Windows

08/09/16

Profiles in cryptographic courage

Profiles in cryptographic courage

Security problems sometimes seem depressingly intractable. The cure? Read about the fascinating people responsible for seminal breakthroughs

08/02/16

3 ways websites get pwned -- and threaten you

3 ways websites get pwned -- and threaten you

Hackers are maliciously manipulating both sides of the web experience, but a little due diligence goes a long way to thwart them

07/26/16

4 basic security facts everyone should know

4 basic security facts everyone should know

The bad news: It's you against an army of cybercriminals around the world. The good news: A little knowledge can provide an effective defense

07/19/16

Spotted! 9 signs of a malicious download

Spotted! 9 signs of a malicious download

You've heard the advice: Don't download or run software you're unsure of. Here's a quick review of the warning signs to stop you from taking unnecessary risks

07/12/16

11 essential data security tips for travelers

11 essential data security tips for travelers

Your data and privacy are never more at risk than when you travel; here's how to protect them

07/01/16

Not so fast: Some security defaults shouldn't change

Not so fast: Some security defaults shouldn't change

Contrary to popular belief, changing default settings doesn't always improve security -- and often backfires

06/28/16

Interview with a Craigslist scammer

Interview with a Craigslist scammer

Ever wondered what motivates people who swindle others on Craigslist? Read on for a fascinating look into the mind of a small-time criminal

06/21/16

Big data will fix internet security ... eventually

Big data will fix internet security ... eventually

Security analytics have been with us for a while, but with the latest tech, it's much easier to detect malicious attacks

06/14/16

 The days of long, complicated passwords are over

The days of long, complicated passwords are over

As threats evolve, so does the advice on creating passwords to foil the bad guys. Here are the latest recommendations

06/07/16

Zero-days aren’t the problem -- patches are

Zero-days aren’t the problem -- patches are

Everyone fears the zero-day exploit. But old, unpatched vulnerabilities still provide the means for malicious hackers to carry out the vast majority of hacks

06/01/16

5 steps to stronger data security

5 steps to stronger data security

The old cliche is true: Your organization's most precious asset is its data. Five basic security building blocks can ensure its safety

05/24/16

Defend yourself! Build a cyber security database

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

05/17/16

You too? Who's on the hacker hit list

You too? Who's on the hacker hit list

You don’t need to carry the keys to the enterprise network to have a malicious hacker tail you. Here’s who’s at risk and what to do about it

05/10/16

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

05/03/16

The dark side of biometric identification

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

04/26/16

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Want to elude snooping at home and abroad? The preconfigured Anonabox router is easier to use than Tor software alone and provides greater protection

04/19/16

Behold the glorious future -- with the same old security

Behold the glorious future -- with the same old security

From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure

04/12/16

Load More