Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

15 10cwdsecurity

army artillery soldier war fight battle

Know your threats before you deploy defenses

Collecting information about how your organization was compromised in the past may not be fun, but without that step, you'll never do security right

Why aren't you managing your Macs?

Macs are showing up at work in larger numbers, but all too often, they're left unmanaged

Security online

Scottrade had no idea about data breach until the feds showed up

The breach affected around 4.6 million customers' names and addresses

Frustrated hipster sitting with laptop

Sorry, Unix fans: OS X El Capitan kills root

Root is no longer supreme in El Capitan, but the real bad news is a breaking change in legacy driver support


Breach at Experian may have exposed data on 15 million consumers linked to T-Mobile

Consumers who applied for credit from T-Mobile since 2013 may have been affected

emv chip and pin

EMV sets the stage for a better payment future

Most merchants now have EMV credit card readers in place, yielding marginally improved security today -- and a platform for better payment systems arriving soon

virtual encryption 175562932

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

cyber security lock secure security

When is a flaw not a flaw? The WinRAR question

A researcher found remote code execution flaw in WinRAR, but the real question is why are you opening unknown RAR files

login prompt security screen

Dyreza malware steals IT supply chain credentials

Cyber criminals are shifting gears from online banking to companies that provide order fulfillment, warehouse management, and other services


Developers find themselves in hackers' crosshairs

Here's what enterprises need to do in order to protect their development environments from attack

steal thief theft burglar laptop secret crime

Got 'em! Researchers steal crypto keys from Amazon cloud

Researchers demonstrate a cloud provider's nightmare: How to use a rogue VM to steal crypto keys from neighbors


Insiders still pose serious security risks

Don't underestimate the damage insiders can do -- and how little prodding they need to wreak havoc


Protect your assemblies using obfuscation

Obfuscation makes your assemblies hard to reverse-engineer, thereby protecting your intellectual property

Digital Key

Newly found TrueCrypt flaw allows full system compromise

Google's Project Zero team discovered two serious flaws in the driver the TrueCrypt full disk encryption program installs on Windows systems

error signal television problem broken

The No. 1 problem with computer security

Everyone focuses on the wrong threats. You've undoubtedly been breached already, so the key is to collect data that can help you prevent attackers from succeeding again

Security in cloud computing

Online ads used for DDoS after pushing malware

Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices

victim of identity theft

Identity theft hit 7% of US population last year

The figure -- almost 18 million people -- is a slight increase from two years earlier

reports open source 5

5 key trends in open source

InfoWorld's Best of Open Source Software Awards shows how dependent we've become on open source for everyday infrastructure and for today's rapid-fire tech development

Load More