Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

sharing business secrets
more productivity tips

Encryption

Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade

IE11 and Edge will drop the lock icon for sites that secure traffic with SHA-1 certificates this summer and will block access by Feb. 14, 2017

blockchain code

IBM brings blockchain framework to IBM Cloud

Enterprises now have a secure IBM Cloud environment to develop blockchain applications that meet regulatory requirements

Android apps (2)

Phishing apps posing as popular payment services infiltrate Google Play

Researchers from security firm PhishLabs say they've found 11 phishing applications hosted on Google Play this year

spying eye

Supreme Court approves rule change that expands FBI computer search powers

The amendments allow judges to issue search warrants for computers with concealed locations

ransom note letters

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

ransomware

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

cyber warfare war

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Attacks could support traditional military operations or open up a new front

US Capitol

In rare unanimous move, House passes bill to protect email and cloud privacy

The U.S. House of Representatives has approved a bill to strengthen privacy protections for email and other data stored in the cloud.

spying eye

Cyberespionage group abuses Windows hotpatching mechanism to hide malware

The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes

computer security stock image

4 password managers that make online security effortless

Protect your passwords and other sensitive info with one of these virtual vaults

iPhone 5c

FBI won't share iPhone hack with Apple because it doesn't know how it works

The FBI claims it doesn't actually know the underlying code that facilitated hacking into the iPhone, so it can't share the method with Apple

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

fingerprint

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

secret

Open secrets: BlackBerry might share what's on your phone

CEO John Chen defends helping law enforcement as reports emerge that multiple governments can unlock BlackBerry communications

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

The Web-based malware attack uses Towelroot and a Hacking Team exploit to compromise devices running old versions of Android

Load More