Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Magnifying glass on top of Best Practices
Node.js programming developer

cyber security

OpenSSL patches two high-severity flaws

Versions 1.0.2h and 1.0.1t of the cryptographic library also patch several more bugs of lesser impact

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

magician hat wand trick

Admins: Don't wait for ImageMagick patch

Millions of websites are vulnerable to flaws in the ImageMagick image processing tool

planning

How to perform a risk assessment

A risk assessment gives you the information protection equivalent of the opposing team’s playbook, telling where and how attackers are most likely to strike and what the damage will be.

Digital Key, security, encryption

Quantum computers pose a huge threat to security, and the NIST wants your help

An upcoming competition will invite the public to propose and test 'quantum-resistant' encryption schemes

terrorist tools

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorist are developing apps that include pre-packaged encryption, DDoS, and a news feed for tech-light jihadists

gear rust machinery

4 projects ripe for a Rust rewrite

As Rust matures, projects aimed at reimplementing existing software in a language built for safety become more practical -- and more numerous

jim hunter greenwave

The IoT company behind the curtain

Greenwave Chief Scientist Jim Hunter explores the promise of the Internet of things -- and the challenges it still faces

office printer

Think that printer in the corner isn’t a threat? Think again

Sitting in the corner, sometimes collecting dust, is an overlooked attack surface

20160330 satya nadella build16

Microsoft's CEO explains why his company sued the U.S. government

The company's commitment to privacy drove it to fight gag orders, Satya Nadella says

android security danger

Google renews focus on Mediaserver flaws in latest Android Security Bulletin

Google renamed its monthly security update, but the contents remain the same: remote execution and elevation of privilege bugs in Mediaserver

stopwatch seconds

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

sharing business secrets

How you could be leaking your secrets onto GitHub

Hard coding credentials and pushing the code to GitHub is a common mistake that can lead to exposing sensitive info like Slack tokens or Amazon keys

more productivity tips

IT leaders pick productivity over security

Implementing security measures can make systems run slower and essentially bog down productivity -- which is causing some enterprises to abandon them

Encryption

Microsoft to begin SHA-1 crypto shutoff with Windows 10's summer upgrade

IE11 and Edge will drop the lock icon for sites that secure traffic with SHA-1 certificates this summer and will block access by Feb. 14, 2017

blockchain code

IBM brings blockchain framework to IBM Cloud

Enterprises now have a secure IBM Cloud environment to develop blockchain applications that meet regulatory requirements

Android apps (2)

Phishing apps posing as popular payment services infiltrate Google Play

Researchers from security firm PhishLabs say they've found 11 phishing applications hosted on Google Play this year

Load More