Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Microsoft files suit against alleged tech support scammers

Over one-third of U.S. citizens contacted by scammers fall for the scam, according to Microsoft

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them


security and privacy icon

The four Mac security options everyone should know

By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so

low tech threats

3 low-tech threats that lead to high-profile breaches

It seems like almost daily that we find a new front-page article about a sophisticated data breach. But, more often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and...

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

sony pictures studio tour

Sony admits employees' personal data may have been compromised by breach

Weeks later, Sony Pictures is telling employees what they already know about the scope of data that was compromised by attackers

crowd

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

android apple lock

How to secure Apple and Android mobile devices using 802.1X

Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

anonymous masks

In threat assessment, the 'who' matters

Knowing who could come after you helps you prepare the appropriate defenses and response. (Insider; registration required)

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

internet things

5 ways to prepare for Internet of things security threats

Excitement over IoT benefits may soon give way to concern over the uncertain security outlook.

balloons in sky

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from big data analytics, but also massive potential for exposure. Here's how to protect yourself and your employees

NSA spy program targets mobile networks worldwide

The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden....

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords, and an image associated with Sony Pictures Entertainment, researchers said

anonymous spy privacy security

Blame China for the NSA's spying campaign on us all

'@War: The Rise of the Military-Internet Complex' explores the origins of the NSA’s war on privacy -- and Silicon Valley's complicity

Load More