Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

binoculars looking watch outlook future
apple 1839363

05 tools

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs

161118 pompeo 1

Pompeo sworn in as CIA chief amid opposition from surveillance critics

Critics are concerned he may roll back privacy reforms, like restrictions on collection of bulk telephone metadata, and may try to introduce curbs on the use of encryption

ransomware at your service 1

The evolution of (and solution to) ransomware

Ransomware has become the scourge of the internet 28 years after it first appeared. Here's how to prevent infection and recover if you're hit

yahoo mail

Yahoo pushes back timing of Verizon deal after breaches

Verizon’s planned acquisition of Yahoo will take longer than expected and won’t close until this year’s second quarter, the internet company said on Monday.

00 tedtalk opener

7 (more) security TED Talks you can’t miss

In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to...

Android apps (2)

Google pushed developers to fix security flaws in 275,000 Android apps

Over 90,000 developers acted based on alerts issued through the Google Play App Security Improvement program

malware attack cyberespionage code hacker

Attackers start wiping data from CouchDB and Hadoop databases

After MongoDB and Elasticsearch, attackers are looking for new database storage systems to attack

scream wheelbarrow nightmare

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night

Legal law gavel hammer courts

Microsoft’s standing to sue over secret US data requests in question

The company has objected in a lawsuit to unreasonable US government requests for customer data

Computer monitor with pixelated locks for security breach

Fake news alert! Internet breaches are not cloud breaches

Ignorant reporting conflates the internet with the cloud; as a result, people lose trust in what is actually a very secure platform

signature signing contract handwriting cursive

Oracle to Java devs: Stop signing JAR files with MD5

Starting in April, if a JAR file is signed with MD5, Oracle will treat it as unsigned

mind the gap sign

Skills gap could hold back blockchain, AI, IoT advancements in 2017

CompTIA finds that IT is poised for great growth in 2017, but with big skills gaps for emerging tech, and security still tough to get right

20151027 oracle cloud on building 100625234 orig

Oracle patches raft of vulnerabilities in business applications

The company's quarterly patch update includes a total of 270 security fixes for many products

internet data

How—and why—you should use a VPN any time you hop on the internet

We'll show you how to protect your online privacy as governments around the world, including the U.S., step up their online surveillance efforts

beach tide summer sand

Passwords: A long goodbye

The campaign to repeal and replace passwords with more secure authentication is making progress. But even those involved say it will be a long time before they disappear

assange on balcony

WikiLeaks’ Assange confident of winning 'any fair trial' in the US

Assange had earlier promised to face US extradition if Chelsea Manning was granted clemency, which she was on Tuesday

p1170191 1

Can a DDoS attack on Whitehouse.gov be a valid protest?

A software engineer wants to take down the Whitehouse.gov site to oppose Trump's inauguration

Digital Key encryption

Sensitive access tokens and keys found in hundreds of Android apps

A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that around 2,500 had API keys and access tokens for third-party services hard-coded into them.

Load More