Don't put all your faith in smart cards

October 22, 2013
Smart cards bolster authentication, but they're hardly a panacea for your company's security questions
Read more »

'Jump boxes' improve security, if you set them up right

October 15, 2013
It's a good idea to set up an ultrasecure computer as a bridge to log on to other PCs, but serious protections must be in place
Read more »

Is your security vendor colluding with the NSA?

October 08, 2013
Encryption software using EC_DRBG random number generator could provide backdoor for NSA to snoop on protected data
Read more »

Windows 8.1 stops pass-the-hash attacks

October 01, 2013
Microsoft has armor-plated Windows 8.1 against the most feared attack on the planet. Here are the nitty-gritty details you need to know
Read more »

Why hacking the iPhone 5s fingerprint reader is no big deal

September 24, 2013
Biometric solutions can't match simpler forms of authentication -- and they're not intended to, despite the iPhone 5s hype
Read more »

5 reasons I'm not too upset over Cryptogeddon

September 10, 2013
No one likes government spying, but those sounding a red alert need to think through the implications more carefully
Read more »

The perfect security defense is right under our noses

September 03, 2013
We can develop and deploy the equivalent of a cloud-connected security expert on every computer -- and stop the bad guys cold
Read more »

Quantum cryptography is the last, best defense

August 27, 2013
When quantum computing finally lands, all encryption will be open -- unless you're protected with quantum cryptography
Read more »

Don't fall prey to ad networks peddling dicey links

August 20, 2013
If your website accepts links from third parties -- such as ad networks -- make sure they don't lead to malicious sites
Read more »

Anonymous is not anonymous

August 13, 2013
At this point, most of us would welcome shelter from the gaze of government cyber spies. Here are six reasons why that may be unattainable
Read more »
©1994-2014 Infoworld, Inc.