6 reasons why heat-based attacks won't happen

6 reasons why heat-based attacks won't happen

Oh, those security researchers, always coming up with exotic new ways to penetrate systems -- but the BitWhisper attack on air-gapped systems is especially far-fetched

03/31/15

Hardware exploits may be a sign of threats to come

Hardware exploits may be a sign of threats to come

Hardware exploits like Rowhammer are rare, so companies don't take them seriously, but they should -- because more are looming

03/24/15

Security guru Bruce Schneier: Your privacy is already gone

Security guru Bruce Schneier: Your privacy is already gone

In 'Data and Goliath,' one of the world's foremost security experts piles on the evidence that privacy is dead -- and proposes a detailed plan to restore it

03/17/15

Infected with malware? Check your Windows registry

Infected with malware? Check your Windows registry

Auditing your registry can turn up telltale signs on malware infection. Here's how to monitor the registry keys that matter using Microsoft's Sysinternals Autoruns

03/10/15

New NSA hack raises the specter of BadBIOS

New NSA hack raises the specter of BadBIOS

Conspiracy theories tend to have one trait in common: They can't be proven. That goes for BadBIOS, despite new revelations of sophisticated NSA firmware hacking

03/03/15

How to detect malware infection in 9 easy steps

How to detect malware infection in 9 easy steps

Hey Windows users: Here's now to get the incredible power of 57 antimalware engines with no performance impact on your computer

02/17/15

Why your company needs a chief privacy officer

A privacy exec with real power can ensure the protection of employee and customer data

02/10/15

All you need to know about the move to SHA-2 encryption

All you need to know about the move to SHA-2 encryption

Over the next two years, the industry will move from SHA-1 encryption to the vastly more secure SHA-2. Here's how to prepare

02/03/15

How to stick it to Craigslist scammers

Now for something completely different: Here's how to avoid getting scammed on Craigslist and have fun in the process

01/27/15

The best computer security advice you'll get

The best computer security advice you'll get

The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know

01/20/15

'Spam Nation': Brian Krebs' must-read security exposé

'Spam Nation': Brian Krebs' must-read security exposé

In 'Spam Nation,' Brian Krebs explains the inner workings of the world's largest cyber crime operations, with rare courage and scrupulous reporting

01/13/15

Enter the matrix: Track down hacks with log files

Enter the matrix: Track down hacks with log files

Any system can collect logs, but most security operations do a poor job of filtering them to find evidence of malicious activity. Here's where to start

01/06/15

Developers must follow security rules, too

Developers must follow security rules, too

The role of the developer has risen in importance in many organizations, so it's high time to ensure developers take security seriously

12/30/14

4 positive predictions for security in 2015

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

12/23/14

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

12/16/14

Be scared: The Sony-style hack is no rare event

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

12/09/14

The catastrophic state of security in 2014

The catastrophic state of security in 2014

Can a mega security disaster be avoided? Not if we continue to accept the poor security practices and consequences that persist today

12/02/14

Thinking of buying a security camera? Read this first

Thinking of buying a security camera? Read this first

When things go bump in the night, you want to see what they are, without opening the door. But security cameras come with vulnerabilities too

11/25/14

Detect network anomalies with StealthWatch

Detect network anomalies with StealthWatch

Searching for a great network traffic flow analysis tool that detects sneak hacker attacks? Look no further than Lancope's StealthWatch

11/18/14

You've been permacookied and don't even know it

You've been permacookied and don't even know it

Every advertiser on the Internet wants to know where you're going, what you're doing, but permacookies go too far

11/04/14

Load More