Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

cyber warfare war
US Capitol

spying eye

Cyberespionage group abuses Windows hotpatching mechanism to hide malware

The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes

computer security stock image

4 password managers that make online security effortless

Protect your passwords and other sensitive info with one of these virtual vaults

iPhone 5c

FBI won't share iPhone hack with Apple because it doesn't know how it works

The FBI claims it doesn't actually know the underlying code that facilitated hacking into the iPhone, so it can't share the method with Apple

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

fingerprint

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

secret

Open secrets: BlackBerry might share what's on your phone

CEO John Chen defends helping law enforcement as reports emerge that multiple governments can unlock BlackBerry communications

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

The Web-based malware attack uses Towelroot and a Hacking Team exploit to compromise devices running old versions of Android

Man trying to sleep in the middle of the night

4 tech nightmares keeping IT leaders up at night

From data breaches to social engineering, there’s plenty to keep tech types tossing and turning

Generic snap for court issues

US no longer requires Apple's help to crack iPhone in New York case

The government said 'an individual' had given it the passcode to the phone used by the accused in a drug investigation

fax machine printer hardware

Why email hasn’t killed the fax

We should have had a suitable alternative to the fax long ago, but email failed

data security ts

Ubuntu Snap doesn't have the security issue -- X11 does

Ubuntu Snap isn't the one making poor security choices. Rather, X11's security model is giving Snap packages access to other applications

151027 facebook headquarters 1

Facebook bug hunter stumbles on backdoor left by hackers

The backdoor script stole Facebook employee credentials from a corporate server

The FBI paid more than $1 million to hack the San Bernardino iPhone

We still don't know anything about where the hack came from or how it works, but we now know it was expensive

cyberwar tanks fight battle combat troops army

Key battle looms in the war to protect privacy

User privacy is under attack from hackers, data miners, and the government, but the EFF and tech groups are fighting back

20151005 Cisco headquarters sign

Cisco fixes serious denial-of-service flaws in wireless LAN controllers, other products

One of the vulnerabilities is critical and the rest are rated as high severity

Load More