Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

strata apache spot hadoop
blockchain code

Glowing band-aids on red background

Analysts laud and lance new Microsoft browser armor

Reviews call Microsoft's new security model for its Edge browser both a terrific idea and a band-aid that doesn't address Windows' real problems

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Similar attacks may be a nation calibrating how strong core internet defenses really are

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

The company isn't saying how it arrived at the conclusion that its massive data breach was carried out by a state-sponsored actor

sofacy 1

New Mac Trojan uses the Russian space program as a front

The Komplex Trojan can download, execute, and delete files from an infected Mac

password security reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

DDoS attacks got a power boost thanks to hundreds of thousands of insecure IoT devices

microsoft dcu malware lab

Here's how Microsoft is using containerization to protect Edge users

Windows Defender Application Guard locks untrusted browsing sessions away from the rest of the OS

Chip and

Trump hotel chain fined over data breaches

The chain, one of Donald Trump’s businesses, also delayed in reporting the breaches to consumers

5 checklist

What’s in your code? Why you need a software bill of materials

When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates

Yahoo

Here's what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.

ddos krebs

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top DDoS protection services.

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf's dream do-over: 2 ways he'd make the internet different

'I doubt I could have gotten away with either one,' says the father of the internet

yahoo mail

Hackers have a treasure trove of data with the Yahoo breach

The data breach affects at least half a billion Yahoo accounts

data privacy ts

Tech leaders must act quickly to ensure algorithmic fairness

Do big data algorithms treat people differently based on characteristics such as race, religion, and gender? Tech leaders must take seriously the debate over data usage -- both because discrimination in any form has to be addressed,...

yahoo mail

Yahoo reportedly to confirm massive data breach

Some users have already been asked to change passwords, after a data breach that affects hundreds of millions of accounts

security code big data cyberespionage DDoS

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

The vulnerability could allow hackers to extract potentially sensitive information from devices' memory

managed security service providers

Lockdown! Harden Windows 10 for maximum security

To make the most of Windows 10's security improvements, you must target the right edition and hardware for your needs

Load More