Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Man yelling screaming with data streaming out of megaphone
Patch

Microsoft yanks botched patch KB 2949927, re-issues KB 2952664

Windows 7 upgrade compatibility patch gets a tweaked installer, while the SHA-2 hashing patch is summarily removed without explanation

Browser makers spell out anti-POODLE plans

The top three browser makers announced yesterday how they will deal with the design flaw in SSL 3.0 after researchers revealed that their "POODLE" attack method can steal encrypted information and pilfer browser session cookies.

businessman stress despair problems bankruptcy trader emotional stress depression 000000736479

Four more botched Microsoft patches: KB 3000061, KB 2984972, KB 2949927, KB 2995388

Windows users are reporting significant problems with four more October Black Tuesday patches

Hackers exploit two more Windows zero-day bugs

Microsoft plans to add this pair of vulnerabilities to today's Patch Tuesday

Dropbox dismisses claims of hack affecting 7 million accounts

Credentials leaked by an alleged hacker online were likely stolen from other services, the online storage company says

screen shot 2014 10 13 at 12.43.34 pm

Anonabox project to offer online anonymity through Tor

The tiny device is an open-source, plug-and-play wireless router that automatically encrypts data and sends it through the Tor network

Magnifying loupe on the laptop keyboard    147860345

Stop sneaky new hack attacks with smarter detection

To break in unnoticed, hackers will use the same tools as administrators. You can catch them regardless

phishing

The human OS: Overdue for a social engineering patch

There is no way to plant a chip in employees to make them invulnerable to social engineering attacks, but training can make them much more difficult to 'hack'

Data center security in the cloud.

5 techniques for securing your enterprise data

The pros and cons of new techniques and tools, such as cloud access security brokers, adaptive access control and pervasive sandboxing

Mayhem malware spreads through Linux servers via Shellshock exploits

The botnet targets Web servers that haven't been patched for recent vulnerabilities found in the Bash Linux shell

symantec logo

Analysts react to Symantec split announcement

Symantec never delivered on its promises for storage, but the split means a less than appealing option for some organizations

patch ie

Microsoft slates critical Windows, IE fixes for next week

Microsoft \will release nine security updates next week, with fixes slated for Internet Explorer, Windows, SharePoint Server and Web app developer tools.

Microsoft researchers create a secure haven in the cloud

To ensure trusted cloud operations, Microsoft Haven uses a new type of virtual machine and a set of new Intel chip security calls

androidusb primary

The BadUSB exploit is deadly, but few may be hit

It's a case of good news/bad news with the BadUSB firmware exploit

proofpoint screenshot 24

An inside look at Russian cyber criminals

A new report takes a rare detailed look at Russian hackers targeting online banking accounts

Slideshow: The Future of Programming

Gartner lays out its top 10 tech trends for 2015

Internet of things, smart machines, pervasive analytics, and 3D printing are all part of Gartner's list of strategic technologies for the year ahead

Microsoft Security Essentials may be throwing false positives for Trojan:DOS/Alureon.J

The precise circumstances are unclear, but it's becoming obvious that MSE in some cases detects a DOS/Alureon.J infection where none exists

computer network 000016779847

How to stop hackers? Know your network

Until the perfect network monitoring tool comes along, knowledge of your network is your best defense

Load More