The dark side of biometric identification

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

04/26/16

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Hands-on: Go (almost) anonymous on the Internet with Anonabox

Want to elude snooping at home and abroad? The preconfigured Anonabox router is easier to use than Tor software alone and provides greater protection

04/19/16

Behold the glorious future -- with the same old security

Behold the glorious future -- with the same old security

From delivery drones to implanted medical monitors, technology is about to become more incredible -- but not more secure

04/12/16

Digital certificates are helping deliver malware

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

04/05/16

Spread honeypots over your defense plan

Spread honeypots over your defense plan

Deployed properly, a honeypot catches intruders like flies to, well, you know what. They deliver enormous value for a modicum of up-front effort

03/29/16

Get hired as a security pro: Insider tips

Get hired as a security pro: Insider tips

Qualifications are one thing. The characteristics that make a security job candidate great are another

03/22/16

The best new security features of Windows 10

The best new security features of Windows 10

With deep protection at its core, Windows 10 is the most secure Windows ever, from virtualization-based security to Windows Hello to Enterprise Data Protection

03/15/16

Why security is really all about trust

Why security is really all about trust

Once you lose faith in a company and its products, no amount of security will restore your trust

03/08/16

Why the feds' iPhone-cracking loss is our gain

Why the feds' iPhone-cracking loss is our gain

The government has been blocked not only from cracking open an iPhone, but from eroding encryption -- and personal privacy -- as we know it

03/01/16

Why we must defend our last shred of privacy

Why we must defend our last shred of privacy

The Apple encryption saga is not about a single phone. We've already lost more privacy than we realize -- and we can't afford to lose more

02/23/16

When it comes to security, it's the data, stupid

When it comes to security, it's the data, stupid

You can't prioritize risk effectively without accurate data about successful exploits in your environment. Start compiling that data now

02/16/16

5 tips to protect your admin credentials

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

02/09/16

5 steps to make threat intelligence work for you

5 steps to make threat intelligence work for you

Determining your top threats is not rocket science -- and the effort will pay off in successful mitigations

02/02/16

Why patching is still a problem -- and how to fix it

Why patching is still a problem -- and how to fix it

Many obstacles stand in the way of perfect patching. Getting around them may be easier than you think

01/26/16

Why you don't need an RFID-blocking wallet

Why you don't need an RFID-blocking wallet

You don't need a tinfoil hat, either. Opportunists have exploited consumer fears to create an industry that doesn't need to exist

01/19/16

Train your users to beat phone scams

Train your users to beat phone scams

'Press 1 to hand us the family jewels' works more often than you might think. A little training can stop this sort of social engineering

01/12/16

A better way to move past insecure SHA-1 certs

A better way to move past insecure SHA-1 certs

The digital certificate switchover from weak SHA-1 to the vastly stronger SHA-2 promises to be brutal, but a new industry proposal could ease the pain

01/05/16

How computer security changed in 2015

How computer security changed in 2015

We made progress, suffered setbacks, added complexity, and did little to deter the onslaught of cyber crime

12/22/15

Why identity is the new security

Why identity is the new security

We're long past the days of perimeter security being enough. Now we need to figure out how to manage user identity in an increasingly complex world

12/15/15

Attention, 'red team' hackers: Stay on target

Attention, 'red team' hackers: Stay on target

You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws

12/08/15

Load More