How to stick it to Craigslist scammers

Now for something completely different: Here's how to avoid getting scammed on Craigslist and have fun in the process

01/27/15

The best computer security advice you'll get

The best computer security advice you'll get

The world is awash in bad security advice that distracts from addressing the real threats. Here's what you really need to know

01/20/15

'Spam Nation': Brian Krebs' must-read security exposé

'Spam Nation': Brian Krebs' must-read security exposé

In 'Spam Nation,' Brian Krebs explains the inner workings of the world's largest cyber crime operations, with rare courage and scrupulous reporting

01/13/15

Enter the matrix: Track down hacks with log files

Enter the matrix: Track down hacks with log files

Any system can collect logs, but most security operations do a poor job of filtering them to find evidence of malicious activity. Here's where to start

01/06/15

Developers must follow security rules, too

Developers must follow security rules, too

The role of the developer has risen in importance in many organizations, so it's high time to ensure developers take security seriously

12/30/14

4 positive predictions for security in 2015

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

12/23/14

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

12/16/14

Be scared: The Sony-style hack is no rare event

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

12/09/14

The catastrophic state of security in 2014

The catastrophic state of security in 2014

Can a mega security disaster be avoided? Not if we continue to accept the poor security practices and consequences that persist today

12/02/14

Thinking of buying a security camera? Read this first

Thinking of buying a security camera? Read this first

When things go bump in the night, you want to see what they are, without opening the door. But security cameras come with vulnerabilities too

11/25/14

Detect network anomalies with StealthWatch

Detect network anomalies with StealthWatch

Searching for a great network traffic flow analysis tool that detects sneak hacker attacks? Look no further than Lancope's StealthWatch

11/18/14

You've been permacookied and don't even know it

You've been permacookied and don't even know it

Every advertiser on the Internet wants to know where you're going, what you're doing, but permacookies go too far

11/04/14

The big one: The makings of a global cyber attack

The big one: The makings of a global cyber attack

Surprise -- the underlying technology matters less to an attack's success than basic human determination

10/28/14

Enough! Stop hyping every new security threat

Enough! Stop hyping every new security threat

Logos for malware? Really? Security vendor marketing wizards are going insane

10/21/14

Stop sneaky new hack attacks with smarter detection

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

10/14/14

How to stop hackers? Know your network

How to stop hackers? Know your network

Until the perfect network monitoring tool comes along, knowledge of your network is your best defense

10/07/14

Shellshock proves open source's 'many eyes' can't see straight

Shellshock proves open source's 'many eyes' can't see straight

With so many people looking at open source code, security flaws should be stopped dead -- but it doesn't work that way

09/30/14

Create your own 'dirty dozen' threat list

Create your own 'dirty dozen' threat list

Which security events should you worry about most? Everyone has different vulnerabilities, so here's how to prioritize

09/23/14

5 reasons why hackers own your organization

5 reasons why hackers own your organization

The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere

09/16/14

Cloud security: We're asking the wrong questions

Cloud security: We're asking the wrong questions

The outcry over celebrity nudes blames a new scapegoat -- the cloud -- for our security woes, but underlying causes run deeper

09/10/14

Load More