Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

President Barack Obama (4)
20160225 stock mwc ericsson booth security locks

security code big data cyberespionage byte

Attackers use hacked home routers to hit Russia's 5 largest banks

The routers were likely hacked through a recent vulnerability in the TR-069 management protocol

nautilus shell

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores

Digital Key security

OpenVPN will be audited for security flaws

Cryptographer Matthew Green will analyze the popular software for flaws

cryptolocker -ransomware - flickr

Fighting ransomware: A fresh look at Windows Server approaches

This electronic evil won't just fade away on its own. Here are a few things you can do

dsc 1707

Ubuntu Core has the keys to IoT security

Securing IoT devices requires vigilance. That's where Ubuntu Core comes in

security lock code

Flash Player remains target of choice for exploit kits

A recent report finds that six of the top 10 vulnerabilities target Flash Player as cybercriminals take advantage of irregular and slow patching schedules

img 20161206 181722 01 01 01

Malicious online ads expose millions to possible hack

The attack campaign, called Stegano, has been spreading from malicious ads hosted by news websites

artificial intelligence AI machine learning brain circuit

IBM Watson steps into real-world cybersecurity

Watson for Cyber Security is a beta program that introduces IBM's machine learning technology to real-world security environments

microsoft windows 10 sign

Here’s how the Windows 10 Creators Update helps enterprises

New features include enhanced security, analytics, and device management

Apple iPhone 5S (1)

App developers not ready for iOS transport security requirements

Many iOS apps opt out of Apple's App Transport Security (ATS) feature or deliberately weaken it

security disaster recovery

4 top disaster recovery packages compared

System administrators identify the best features — and what’s missing — in four leading software suites for disaster recovery

3648438218 2ecc0c3414 o

Obama's cybersecurity plan faces uncertainty with Trump

The Obama-backed commission has come up with a variety of recommendations to improve the country's cybersecurity problems

lawsuit judge law court decision sued gavel

Why it's so hard to prosecute cyber criminals

The bad guys are wreaking havoc. Why can't they be brought to justice?

cloud security skywriting

The cloud storage security gap -- and how to close it

Cloud storage vendors don't provide a comfortable balance for some IT admins, but third-party options get you part way there

SSL padlock icon security

Chrome bug triggered errors on websites using Symantec SSL certificates

The bug affected Chrome on all platforms, as well as the WebView component on Android

grave stones

How to survive the death of Flash

What should an enterprise ban Flash, phase it out, or accept that it will remain as legacy software for the foreseeable future? Here’s a guide

privacy lock security public domain

How Windows 10 data collection trades privacy for security

Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft

padlock unlocked security hole flaw

7 security predictions for 2017

If you thought 2016 was bad, fasten your seat belts -- next year is going to be even worse

Load More