Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Apple computers vulnerable to 'Thunderstrike 2' firmware worm

The improved attack highlights ongoing concerns over the security of a computer's low-level code

Graphic blue background with computer monitor and bug on top

Scam definition

Windows 10 upgrade scams are only warming up

Ransomware and phishing scams tied to current events have been staples of criminal hackers for years, and the Windows 10 upgrade scam is the latest version

DNS server attacks begin using BIND software flaw

Analysts had predicted attackers would quickly figure out how to take advantage of the flaw

Critical BIND denial-of-service flaw could disrupt large portions of the Internet

The flaw could be exploited remotely to crash DNS servers by sending them a single packet

Researchers develop astonishing Web-based attack on a computer's DRAM

The Rowhammer problem can be exploited using JavaScript over the Web, researchers have found

uscyberattacks ts

How should the U.S. respond to state-sponsored cyber attacks?

A new poll suggests the general public views the growing threats from nation-states as significant, but they may be off base in terms of their prescriptions for how to respond

Groups urge Obama to oppose cyber threat sharing bills

They say the Senate's CISA cyber threat information sharing bill would allow businesses to share too much information

Xen patches new virtual-machine escape vulnerability

The flaw affects virtualization systems that use QEMU to emulate CD-ROM drives

it security salaries

Cyber security job market to suffer severe workforce shortage

The shortage of experienced talent -- expected to reach 1.5 million by 2019 -- may explain why a cyber security software engineer earns more than a CSO

internet addiction

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

security lock people users

The 8 most in-demand IT security certifications

High-profile security breaches have highlighted the need for skilled security professionals. The most recent IT Skills and Certifications Pay Index from research and analysis firm Foote Partners confirms that IT pros holding security...

master lock with root password

Google: Users still aren’t getting message about online security

The importance of regular software updates is apparently lost on a large proportion of Internet users who aren't security experts

HP's ZDI discloses 4 new vulnerabilities in Internet Explorer

ZDI went public after extending the disclosure deadline twice with no fix forthcoming from Microsoft

Microsoft to make enterprise security tools generally available

Advanced Threat Analytics and Rights Management Service become generally available

Bug exposes OpenSSH servers to brute-force password guessing attacks

The keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found

Google slams proposed export controls on security tools

Says controls on exporting hacking tools are 'dangerously broad and vague' and would hurt the security research community

classroom ipads students teach learn lesson

Waste of time or wise investment? Two sides of user security training

Cynics say no amount of security training can prevent users from slipping up and bulletproof defenses are the only answer

no flash

A world without Flash: The countdown begins

Adobe's much-maligned rich Internet technology could effectively be dead within five years, according to analysts

pothole

Microsoft plugs gaping security hole with KB 3079904, KB 3074667

It’s a critical patch for all versions of Windows, including Windows 10, covering yet another OpenType font problem

Load More