3 clues to spotting a spam scam

3 clues to spotting a spam scam

The notice looked real at first -- but turned out to be an obvious scam. Unraveling its origins offered an object lesson in how not to get suckered

11/29/16

Moment of truth: Web browsers and the SHA-1 switch

Moment of truth: Web browsers and the SHA-1 switch

SHA-1 encryption is ending. Here's how your browser will react

11/22/16

5 ways President Trump may affect computer security

5 ways President Trump may affect computer security

You can expect the new administration to take full advantage of surveillance techniques, ease security regulations for business, and mandate more punishment for hackers

11/15/16

No, you still don't need an RFID-blocking wallet

No, you still don't need an RFID-blocking wallet

Criminals with RFID scanners roaming the streets stealing credit card numbers should be way down your list of worries

11/08/16

Is it real? The Trump-Russia server connection

Is it real? The Trump-Russia server connection

A recent report suggests a link between a server maintained by Trump's organization and another by Russia's Alfa Bank

11/01/16

How Clinton could have avoided the Wikileaks fiasco

How Clinton could have avoided the Wikileaks fiasco

Hillary Clinton's email server and her advisers' email accounts are no more or less vulnerable than most, but securing them would have been easy

11/01/16

The only realistic plan to avoid DDoS disaster

The only realistic plan to avoid DDoS disaster

Emergencies like the Dyn DDoS attack will keep occurring. The only solution is a better, more secure internet

10/25/16

Which country has the best hackers: Russia or China?

Which country has the best hackers: Russia or China?

Both are notorious for high-profile attacks, advanced persistent threats, and theft of money or intellectual property. And the award goes to ...

10/18/16

10 decisions you'll face when deploying a honeypot

Set up a fake system as bait and you can cull invaluable information about potential threats. Here are the questions awaiting you in your honeypot adventure

10/11/16

6 security distractions derailing IT

6 security distractions derailing IT

IT isn't dumb, but it's pulled in so many different directions that completing even one worthy security project seems like a major victory

10/04/16

A quick fix for stupid password reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

09/27/16

Seagate NAS hack should scare us all

Seagate NAS hack should scare us all

An under-the-radar news story proves that computers are far from the only devices prey to attack

09/20/16

Afraid of online hacks? Worry more about your phone

Afraid of online hacks? Worry more about your phone

An entire industry is devoted to protecting you online. It's about time we took phone scams as seriously

09/13/16

Voting machines are still too easy to hack

Voting machines are still too easy to hack

Worried about a 'rigged' election? You should be, but the risk lies in outdated technology and untrained bureaucrats, not voter fraud

09/06/16

Hollywood's 5 biggest hacking myths

Hollywood's 5 biggest hacking myths

Press Enter and watch the magic happen -- as if! Why does Hollywood's portrayal of hacking have to be so far off the mark?

08/30/16

Paranoia rules! 5 types of imaginary malware

Paranoia rules! 5 types of imaginary malware

Computer security attracts all sorts of skeptical personalities. A little doubt is healthy; a lot may mean you should seek professional help

08/23/16

6 security advances worth celebrating

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

08/16/16

SHA-2 shortcut: Easy certificate management for Linux

SHA-2 shortcut: Easy certificate management for Linux

Due to the rollover from SHA-1 to SHA-2, a ton of digital certificate work is needed. With CertAccord, it's as easy to do on Linux as on Windows

08/09/16

Profiles in cryptographic courage

Profiles in cryptographic courage

Security problems sometimes seem depressingly intractable. The cure? Read about the fascinating people responsible for seminal breakthroughs

08/02/16

3 ways websites get pwned -- and threaten you

3 ways websites get pwned -- and threaten you

Hackers are maliciously manipulating both sides of the web experience, but a little due diligence goes a long way to thwart them

07/26/16

Load More