Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Microsoft Windows broken

Adobe releases previously delayed security updates for Reader and Acrobat

The updates fix eight vulnerabilities, including some that could be exploited to infect computers with malware


Apple turns on iCloud two-step verification after nude selfie scandal

Two-step verification is not mandatory though Apple recommends the added security protection

Court throws out $368.2 million patent award against Apple

A lower court made mistakes in defining the value of the patented technology asserted by VirnetX, an appeals court says

Security hole

New NSA-funded programming language could close long-standing security holes

Wyvern securely rolls five programming languages into one.

data breach

Why retailers like Home Depot get hacked

Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say.

Apple Watch under scrutiny for privacy by Connecticut attorney general

Attorney General George Jepsen is particularly concerned about the protection of health information collected by the new wearable device

Data loss detection tool mines the ephemeral world of 'pastes'

Thousands of email addresses are leaked every day on Pastebin unknown to most users

Hacking stealing password data.

5 reasons why hackers own your organization

The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere

How network virtualization is used as a security tool

As VMware sells its network virtualization software, it's finding that security is a big driver for adoption

3 security practices IoT will disrupt

The rush to bring IoT products to market has created a new wave of security issues

Cloud computing security lock.

Cloud security: We're asking the wrong questions

The outcry over celebrity nudes blames a new scapegoat -- the cloud -- for our security woes, but underlying causes run deeper

Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates

The new Flash Player update patches 12 vulnerabilities, many of which could allow remote code execution

Home Depot confirms breach of its payment systems

Customers will not be held responsible for fraudulent charges, the company said

IBM secures SoftLayer with Intel trusted modules

Intel's Trusted Execution Technology helps the IBM cloud service meet stringent compliance and auditing regulations

11 open source security tools catching fire on GitHub

Malware analysis, penetration testing, computer forensics -- GitHub hosts a number of compelling tools for securing computing environments of all sizes

Why you don't need long, complex passwords

These days, hackers steal passwords wholesale, not one by one, which is why you can ignore outdated password practices

Home Depot investigates payment data breach

The retailer is working with law enforcement and banking partners

Revoke certificates when you need to -- the right way

A secure Internet runs off the assurance of digital certificates. Revoking those certificates is often necessary, but problematic. Here's your best shot at doing it effectively

Top 5 things to watch for at VMWorld 2014

A year ago VMware laid out an ambitious plan, now it's time to hear the details

Load More