New NSA hack raises the specter of BadBIOS

New NSA hack raises the specter of BadBIOS

Conspiracy theories tend to have one trait in common: They can't be proven. That goes for BadBIOS, despite new revelations of sophisticated NSA firmware hacking

03/03/15

How to detect malware infection in 9 easy steps

How to detect malware infection in 9 easy steps

Hey Windows users: Here's now to get the incredible power of 57 antimalware engines with no performance impact on your computer

02/17/15

Why your company needs a chief privacy officer

A privacy exec with real power can ensure the protection of employee and customer data

02/10/15

All you need to know about the move to SHA-2 encryption

All you need to know about the move to SHA-2 encryption

Over the next two years, the industry will move from SHA-1 encryption to the vastly more secure SHA-2. Here's how to prepare

02/03/15

How to stick it to Craigslist scammers

Now for something completely different: Here's how to avoid getting scammed on Craigslist and have fun in the process

01/27/15

The best computer security advice you'll get

The best computer security advice you'll get

The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know

01/20/15

'Spam Nation': Brian Krebs' must-read security exposé

'Spam Nation': Brian Krebs' must-read security exposé

In 'Spam Nation,' Brian Krebs explains the inner workings of the world's largest cyber crime operations, with rare courage and scrupulous reporting

01/13/15

Enter the matrix: Track down hacks with log files

Enter the matrix: Track down hacks with log files

Any system can collect logs, but most security operations do a poor job of filtering them to find evidence of malicious activity. Here's where to start

01/06/15

Developers must follow security rules, too

Developers must follow security rules, too

The role of the developer has risen in importance in many organizations, so it's high time to ensure developers take security seriously

12/30/14

4 positive predictions for security in 2015

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

12/23/14

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

12/16/14

Be scared: The Sony-style hack is no rare event

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

12/09/14

The catastrophic state of security in 2014

The catastrophic state of security in 2014

Can a mega security disaster be avoided? Not if we continue to accept the poor security practices and consequences that persist today

12/02/14

Thinking of buying a security camera? Read this first

Thinking of buying a security camera? Read this first

When things go bump in the night, you want to see what they are, without opening the door. But security cameras come with vulnerabilities too

11/25/14

Detect network anomalies with StealthWatch

Detect network anomalies with StealthWatch

Searching for a great network traffic flow analysis tool that detects sneak hacker attacks? Look no further than Lancope's StealthWatch

11/18/14

You've been permacookied and don't even know it

You've been permacookied and don't even know it

Every advertiser on the Internet wants to know where you're going, what you're doing, but permacookies go too far

11/04/14

The big one: The makings of a global cyber attack

The big one: The makings of a global cyber attack

Surprise -- the underlying technology matters less to an attack's success than basic human determination

10/28/14

Enough! Stop hyping every new security threat

Enough! Stop hyping every new security threat

Logos for malware? Really? Security vendor marketing wizards are going insane

10/21/14

Stop sneaky new hack attacks with smarter detection

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

10/14/14

How to stop hackers? Know your network

How to stop hackers? Know your network

Until the perfect network monitoring tool comes along, knowledge of your network is your best defense

10/07/14

Load More