Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

FBI Comey

blackberry slider clean

What’s left for BlackBerry? The products that still matter

Mobile security, management, and communications tools are what BlackBerry is now all about, though the quality varies

army of robots 176859594

Microsoft's cloud dominance comes with a security risk

Microsoft and third parties are layering on more security technology to keep vulnerabilities harder to exploit at scale

strata apache spot hadoop

Meet Apache Spot, a new open source project for cybersecurity

The effort taps big data analytics and machine learning for advanced threat detection

blockchain code

Financial sector expands use of blockchain databases

Survey shows 65 percent expect to use blockchain distributed database software within three years

Glowing band-aids on red background

Analysts laud and lance new Microsoft browser armor

Reviews call Microsoft's new security model for its Edge browser both a terrific idea and a band-aid that doesn't address Windows' real problems

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Similar attacks may be a nation calibrating how strong core internet defenses really are

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

The company isn't saying how it arrived at the conclusion that its massive data breach was carried out by a state-sponsored actor

sofacy 1

New Mac Trojan uses the Russian space program as a front

The Komplex Trojan can download, execute, and delete files from an infected Mac

password security reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

DDoS attacks got a power boost thanks to hundreds of thousands of insecure IoT devices

microsoft dcu malware lab

Here's how Microsoft is using containerization to protect Edge users

Windows Defender Application Guard locks untrusted browsing sessions away from the rest of the OS

Chip and

Trump hotel chain fined over data breaches

The chain, one of Donald Trump’s businesses, also delayed in reporting the breaches to consumers

5 checklist

What’s in your code? Why you need a software bill of materials

When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates

Yahoo

Here's what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.

ddos krebs

Largest DDoS attack ever delivered by botnet of hijacked IoT devices

Securing the internet of things should become a major priority now that an army of compromised devices – perhaps 1 million strong - has swamped one of the industry’s top DDoS protection services.

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf's dream do-over: 2 ways he'd make the internet different

'I doubt I could have gotten away with either one,' says the father of the internet

yahoo mail

Hackers have a treasure trove of data with the Yahoo breach

The data breach affects at least half a billion Yahoo accounts

Load More