Can you hack an airplane? Brace yourself

Can you hack an airplane? Brace yourself

Suddenly, everyone is worried about malicious hackers breaching networks connected to airplane control systems

04/21/15

Secrets are the enemy of a good security defense

Secrets are the enemy of a good security defense

When you make a mistake, it's natural to want to keep the details quiet. But failing to recount the exact conditions that permitted a hack to occur only ensures a repeat

04/14/15

Fast and effective malware detection -- for free

Fast and effective malware detection -- for free

Everyone discovers software on the Internet that looks like the right tool for a specific job. But is it safe? The Malwr malware detection site can tell you

04/07/15

6 reasons why heat-based attacks won't happen

6 reasons why heat-based attacks won't happen

Oh, those security researchers, always coming up with exotic new ways to penetrate systems -- but the BitWhisper attack on air-gapped systems is especially far-fetched

03/31/15

Hardware exploits may be a sign of threats to come

Hardware exploits may be a sign of threats to come

Hardware exploits like Rowhammer are rare, so companies don't take them seriously, but they should -- because more are looming

03/24/15

Security guru Bruce Schneier: Your privacy is already gone

Security guru Bruce Schneier: Your privacy is already gone

In 'Data and Goliath,' one of the world's foremost security experts piles on the evidence that privacy is dead -- and proposes a detailed plan to restore it

03/17/15

Infected with malware? Check your Windows registry

Infected with malware? Check your Windows registry

Auditing your registry can turn up telltale signs on malware infection. Here's how to monitor the registry keys that matter using Microsoft's Sysinternals Autoruns

03/10/15

New NSA hack raises the specter of BadBIOS

New NSA hack raises the specter of BadBIOS

Conspiracy theories tend to have one trait in common: They can't be proven. That goes for BadBIOS, despite new revelations of sophisticated NSA firmware hacking

03/03/15

How to detect malware infection in 9 easy steps

How to detect malware infection in 9 easy steps

Hey Windows users: Here's now to get the incredible power of 57 antimalware engines with no performance impact on your computer

02/17/15

Why your company needs a chief privacy officer

A privacy exec with real power can ensure the protection of employee and customer data

02/10/15

All you need to know about the move to SHA-2 encryption

All you need to know about the move to SHA-2 encryption

Over the next two years, the industry will move from SHA-1 encryption to the vastly more secure SHA-2. Here's how to prepare

02/03/15

How to stick it to Craigslist scammers

Now for something completely different: Here's how to avoid getting scammed on Craigslist and have fun in the process

01/27/15

The best computer security advice you'll get

The best computer security advice you'll get

The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know

01/20/15

'Spam Nation': Brian Krebs' must-read security exposé

'Spam Nation': Brian Krebs' must-read security exposé

In 'Spam Nation,' Brian Krebs explains the inner workings of the world's largest cyber crime operations, with rare courage and scrupulous reporting

01/13/15

Enter the matrix: Track down hacks with log files

Enter the matrix: Track down hacks with log files

Any system can collect logs, but most security operations do a poor job of filtering them to find evidence of malicious activity. Here's where to start

01/06/15

Developers must follow security rules, too

Developers must follow security rules, too

The role of the developer has risen in importance in many organizations, so it's high time to ensure developers take security seriously

12/30/14

4 positive predictions for security in 2015

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

12/23/14

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

12/16/14

Be scared: The Sony-style hack is no rare event

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

12/09/14

The catastrophic state of security in 2014

The catastrophic state of security in 2014

Can a mega security disaster be avoided? Not if we continue to accept the poor security practices and consequences that persist today

12/02/14

Load More