Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

single sign on tools review 1

green paper glasses with fake black paper mustache

Fake LinkedIn profiles lure unsuspecting users

Hackers create fictional people on LinkedIn to engage in industrial espionage and social engineering attacks

linux penguins arguing

Don’t blame Linux for the XOR botnet

The real culprits are the irresponsible vendors behind cheap broadband routers and their clueless customers


9 notorious hackers: Who they are, why they did it

On the Internet, nobody knows you're not in the mafia

mergers and acquisitions

LogMeIn acquires LastPass to beef up identity portfolio

LogMeIn's $125 million buy of LastPass solidifies its position in an increasingly crowded identity and access management market

phishing attempt

Teach your execs well: Stop phishing in the C-suite

To keep company information and systems safe, IT needs to blend user training with technology defenses

SSL padlock icon

SHA-1 hashing algorithm could succumb to $75K attack, researchers say

Researchers say the SHA-1 hashing algorithm, still used to sign almost one in three SSL certificates, should be urgently retired

internet of things laptop

IoT will become a matter of life or death for security pros

The need to move beyond just protecting computer systems is the biggest challenge ever faced by IT, Gartner says

blocked shot volleyball

Survey says enterprises are stepping up their security game

To fight threats, enterprises are increasing information security spending, collaborating on threat intelligence efforts, and turning to cyber security insurance policies

Cloud Security

AWS security and compliance tools embrace enterprise clouds

Two new Amazon cloud products proactively deal with security issues before they become security and compliance problems

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is as good -- and far easier to compromise?

ipad security

Apple’s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID

Average business spends $15 million battling cyber crime

The cost was up 20 percent compared to last year, as attacks are happening more frequently and are becoming more severe

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor?

army artillery soldier war fight battle

Know your threats before you deploy defenses

Collecting information about how your organization was compromised in the past may not be fun, but without that step, you'll never do security right

Why aren't you managing your Macs?

Macs are showing up at work in larger numbers, but all too often, they're left unmanaged

Security online

Scottrade had no idea about data breach until the feds showed up

The breach affected around 4.6 million customers' names and addresses

Frustrated hipster sitting with laptop

Sorry, Unix fans: OS X El Capitan kills root

Root is no longer supreme in El Capitan, but the real bad news is a breaking change in legacy driver support


Breach at Experian may have exposed data on 15 million consumers linked to T-Mobile

Consumers who applied for credit from T-Mobile since 2013 may have been affected

Load More