Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

spying eye
ransom note letters

ransomware

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

cyber warfare war

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

Attacks could support traditional military operations or open up a new front

US Capitol

In rare unanimous move, House passes bill to protect email and cloud privacy

The U.S. House of Representatives has approved a bill to strengthen privacy protections for email and other data stored in the cloud.

spying eye

Cyberespionage group abuses Windows hotpatching mechanism to hide malware

The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes

computer security stock image

4 password managers that make online security effortless

Protect your passwords and other sensitive info with one of these virtual vaults

iPhone 5c

FBI won't share iPhone hack with Apple because it doesn't know how it works

The FBI claims it doesn't actually know the underlying code that facilitated hacking into the iPhone, so it can't share the method with Apple

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

hacker hacked threat

5 tips for defending against advanced persistent threats

APTs are increasing in occurrence and severity, as are the costs associated with protecting businesses adequately from. Is your organization prepared?

fingerprint

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

secret

Open secrets: BlackBerry might share what's on your phone

CEO John Chen defends helping law enforcement as reports emerge that multiple governments can unlock BlackBerry communications

firewall

What users love (and hate) about 4 leading firewalls

Enterprise users weigh in on their favorite features and offer suggestions for improvement

150817 google marshmallow 03

Malvertising attack silently infects old Android devices with ransomware

The Web-based malware attack uses Towelroot and a Hacking Team exploit to compromise devices running old versions of Android

Man trying to sleep in the middle of the night

4 tech nightmares keeping IT leaders up at night

From data breaches to social engineering, there’s plenty to keep tech types tossing and turning

Generic snap for court issues

US no longer requires Apple's help to crack iPhone in New York case

The government said 'an individual' had given it the passcode to the phone used by the accused in a drug investigation

fax machine printer hardware

Why email hasn’t killed the fax

We should have had a suitable alternative to the fax long ago, but email failed

data security ts

Ubuntu Snap doesn't have the security issue -- X11 does

Ubuntu Snap isn't the one making poor security choices. Rather, X11's security model is giving Snap packages access to other applications

151027 facebook headquarters 1

Facebook bug hunter stumbles on backdoor left by hackers

The backdoor script stole Facebook employee credentials from a corporate server

Load More