Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

signature signing contract handwriting cursive
mind the gap sign

20151027 oracle cloud on building 100625234 orig

Oracle patches raft of vulnerabilities in business applications

The company's quarterly patch update includes a total of 270 security fixes for many products

internet data

How—and why—you should use a VPN any time you hop on the internet

We'll show you how to protect your online privacy as governments around the world, including the U.S., step up their online surveillance efforts

beach tide summer sand

Passwords: A long goodbye

The campaign to repeal and replace passwords with more secure authentication is making progress. But even those involved say it will be a long time before they disappear

assange on balcony

WikiLeaks’ Assange confident of winning 'any fair trial' in the US

Assange had earlier promised to face US extradition if Chelsea Manning was granted clemency, which she was on Tuesday

p1170191 1

Can a DDoS attack on Whitehouse.gov be a valid protest?

A software engineer wants to take down the Whitehouse.gov site to oppose Trump's inauguration

Digital Key encryption

Sensitive access tokens and keys found in hundreds of Android apps

A new study performed by cybersecurity firm Fallible on 16,000 Android applications revealed that around 2,500 had API keys and access tokens for third-party services hard-coded into them.

1 darkweb marketplace

The unseemly world of Darkweb marketplaces

Find out the various characteristics of a variety of underground markets that offer services for cyber criminals to profit from

151119 paris attacks 2

Terrorists are winning the digital arms race

Countries need to work together to craft an online counternarrative, security experts say

security group team circuitry

The war for cybersecurity talent hits the Hill

The workforce shortage of cybersecurity workers in the U.S. currently is at 300,000 or more, experts estimate

keys

Google ventures into public key encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys

security training ts

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

Closeup of combination safe

Mobile is still the safest place for your data

IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you

spyware burglar crack safe computer

Adobe Acrobat Reader DC security update installs Chrome spyware

Adobe says the data collected by the new “Adobe Product Improvement Program” spyware is anonymous, thus innocuous

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

NSA headquarters

Suspected NSA tool hackers dump more cyberweapons

The Shadow Brokers released hacking tools designed to spy on Windows systems after attempting to sell a large cache for bitcoin

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization

Load More