Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Rackspace DNS recovers after DDoS brings system down

Some users felt customer serivce was lacking and called for more detailed and frequent updates about the outage

Frequently asked questions about the North Korean Internet incident

Questions abound, but speculation is emerging


North Korea's Internet restored after 9-hour outage

The outage had led to speculation that the United States had retaliated in the wake of the hack of Sony Pictures

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

Tor warns of possible disruption of network through server seizures

Tor did not name the group that it expects may seize its specialized servers, which are called directory authorities

FBI concludes North Korea 'responsible' for Sony hack

Announcement follows two-week investigation into major cyberattack

Microsoft files suit against alleged tech support scammers

Over one-third of U.S. citizens contacted by scammers fall for the scam, according to Microsoft

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them

security and privacy icon

The four Mac security options everyone should know

By default, the Mac is pretty secure. But with the help of a couple of built-in options, you can make it even more so

low tech threats

3 low-tech threats that lead to high-profile breaches

It seems like almost daily that we find a new front-page article about a sophisticated data breach. But, more often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and...

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

sony pictures studio tour

Sony admits employees' personal data may have been compromised by breach

Weeks later, Sony Pictures is telling employees what they already know about the scope of data that was compromised by attackers

crowd

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

android apple lock

How to secure Apple and Android mobile devices using 802.1X

Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

anonymous masks

In threat assessment, the 'who' matters

Knowing who could come after you helps you prepare the appropriate defenses and response. (Insider; registration required)

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

Load More