Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Mozilla may offer new browser features only on secure websites

Non-secure HTTP sites will not get access to new browser features, Mozilla says

Lawmakers criticize FBI's request for encryption back doors

It's impossible to ensure that only good guys will be able to access them, lawmakers say


Bill to rein in NSA phone data collection reintroduced

The USA Freedom Act aims to end the agency's bulk collection of U.S. telephone records

vault safe lock security

Mitchell Hashimoto follows up Vagrant with Vault key encryption

Vault not only stores encryption keys and credentials, but generates them automatically for use in services and APIs

businesspeople with heads in sand

3 ways security risk assessment goes wrong

Even pro computer security defenders have trouble separating real threats from unlikely ones. Here are three crucial -- and common -- mistakes to avoid

With ransomware on the rise, cryptographers take it personally

The security industry is not doing enough and it's going to get worse, cryptographers said

Anit Yoran

RSA chief to security pros: Stop addressing the wrong problems

RSA President Amit Yoran offers up a five-point plan to deal with the new security environment

Congress moves forward on cyber threat sharing bill despite privacy concerns

The House may vote this week on a bill that would allow shared cyber theat information to be passed to the NSA and law enforcement agencies

IBM launches new threat-analytics tools in the cloud

Based on QRadar, the new security-focused offerings are available as SaaS

Apple logo, patched up

Apple's OS X 'Rootpipe' patch flops, fails to fix flaw

Researcher finds 'trivial way' to exploit privilege escalation vulnerability after Apple tries to plug Yosemite hole

HTTPS snooping flaw affected 1,000 iOS apps with millions of users

Flaw in the third-party library AFNetworking broke HTTPS certificate validation, enabling man-in-the-middle attacks

airplanes flight paths

Can you hack an airplane? Brace yourself

Suddenly, everyone is worried about malicious hackers breaching networks connected to airplane control systems

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

Dropbox to pay security researchers for bugs

Dropbox, which has not set a maximum reward, joins the list of companies crowdsourcing parts of their security testing

Drones Behaving Badly

Drones behaving badly: Dark skies ahead

Technical advances -- and questionable use -- are fast accelerating the need for policies regarding the unmanned future of our skies

sec vulnerability lock bolt

4 no-bull facts about Microsoft's HTTP.sys vulnerability

The latest Web server vulnerability affects desktop systems as well as Microsoft products

patches man laptop computer headache frustration

Microsoft woes: Patch KB 3013769, Skype for Business, Windows 10 nagware

Several of this month's Black Tuesday patches are already showing signs of trouble

wyod blog image

Software development and security in the WYOD age

The new wave of wearables will change the way that enterprise IT works in the coming era: Wear Your Own Device (WYOD)

apple watch calls time on apple retail

5 security questions you should be asking about the Apple Watch

Many security professionals are already thinking about the security implications of the Apple Watch

whisper shh quiet mouth lips men antique vintage secret

Secrets are the enemy of a good security defense

When you make a mistake, it's natural to want to keep the details quiet. But failing to recount the exact conditions that permitted a hack to occur only ensures a repeat

Load More