Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

hipster dude

New LogJam encryption flaw puts Web surfers at risk

LogJam is closely related to the FREAK security vulnerability and involves downgrading TLS connections to a weak key


Critical vulnerability in NetUSB driver exposes millions of routers to hacking

Tens of routers and other embedded devices from various manufacturers likely have the flaw, security researchers say

URL-spoofing bug in Safari could enable phishing attacks

Researcher develops code that can trick Safari into showing a different URL in its address bar than the one currently loaded

Login system supplies fake passwords to hackers

The research project ErsatzPasswords aims to stop the cracking of password hashes

unlocked gate

Containers have arrived -- and no one knows how to secure them

When you add yet another layer to the stack, you add security complexity, no matter what the proponents of Docker or competing container solutions say

security tools 1

Top security tools in the fight against cyber crime

There’s no silver bullet, so load up with as many of these security tools as you can

adware malware banners

Malicious adware more than doubled last year

The amount of adware discovered online doubled as cyber criminals adjusted their strategy in the wake of better security elsewhere

indian cobra snake venom poison

The Venom vulnerability: Little details bite back

Bad attacks rarely come through the front door -- instead, the old cracks let in the problems

The best way to protect passwords may be creating fake ones

Research project NoCrack creates plausible decoy password vaults to confuse attackers

training magnifying glass spotlight

Get real about user security training

Do you despair that users will never learn to avoid stupid security mistakes that compromise your organization? Maybe you're not spending enough time and effort on training

Controversial MacKeeper security program opens critical hole on Mac computers

The program's developers are urging users to update to its latest version as soon as possible

GPU malware can also affect Windows PCs, possibly Macs

A team of anonymous developers is trying to raise awareness about GPU malware

designed for security

Twistlock aims to do Docker security better than Docker

Former Microsoft R&D engineers are pushing an end-to-end solution for Docker security, assuming Docker doesn't beat them to the punch

New Linux rootkit leverages GPUs for stealth

The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory

new macbook primary

The truth about Macs in the enterprise

Security, manageability, and lower TCO are why Macs should comprise 10 to 25 percent of your work PCs

write down list pen paper

Docker finally puts its security best practices on paper

Docker and others have collaborated on codifying a long-overdue list of security best practices

Rombertik malware destroys computers if detected

Rombertik is designed to steal any plain text entered into a browser window

Microsoft picks security for the enterprise win

The company has revamped its routine for supplying security patches and has unveiled data and system protections

mayberry sheriff car police car retro revival antique 000000147714

We need the Internet police now more than ever

Beyond the reach of traditional policing, Internet crime calls for a new kind of law enforcement agency

Load More