Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

encryption yiaw4a
holiday ecommerce

microsoft headquarters

Microsoft enables potential unwanted software detection for enterprise customers

Sysadmins can now turn on the feature in System Center Endpoint Protection and Forefront Endpoint Protection

generic image of a wi-fi router

Millions of embedded devices use the same hard-coded SSH and TLS private keys

Keys hard-coded in thousands of routers, modems, IP cameras, VoIP phones and other devices can be used to launch man-in-the-middle attacks

mobile payment wallet money smartphone

Mobile payment apps no safer than other mobile apps

A study of 10 popular mobile payment apps found they lack even the most basic security controls

email in inbox inbox internet mail communication 000003644536

Beware the holiday scams coming to your email inbox

Every year, someone falls for something that's too good to be true. Make sure your users are up to date on the latest social engineering scams this holiday season


Node.js discloses two critical security vulnerabilities

The Node.js Foundation revealed a denial-of-service and an out-of-bounds access issue and said the fixes will come next week

certifications certified certificate

Dell debacle reveals widespread ignorance on security certificates

Dell pre-installing eDellRoot on Windows machines shows that even the world's largest PC maker doesn't understand how certificates and keys function

dell xps 13 15

And then there were two: Another dangerous Dell root certificate discovered

After Dell confirmed that one of its support tools installed a dangerous self-signed root certificate and private key on computers, users discovered a similar certificate deployed by a different Dell tool

victim identity theft computer problem

What you need to know about Dell's root certificate security debacle

The full scope of the incident is still unclear -- and it's not just laptops -- but there's a removal tool available

8 https

Dell security error widens as researchers dig deeper

Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop and evidence another problematic one is circulating

identity theft thief artificial stealing white collar crime 000000706819

To catch a thief: Cyber sleuth edition

Several bizarre coincidences led to the pursuit of a suspected fraudster in a shopping mall. It did not end well


Dell computers shipping with potentially dangerous root certificate authority

The threat posed by the pre-installed CA is being likened to Superfish

hardware security embedded circuit board integrated controller

Study shows many embedded devices ship without adequate security tests

A large-scale security test of firmware images for embedded devices easily found thousands of vulnerabilities

cloud computing future sdn prediction

9 enterprise tech trends for 2016 and beyond

Enterprise technology development keeps racing ahead, and this year's forecast explains how most of it will be wrapped in the cloud


IBM offers to take on authentication for developers

IBM incorporated Identity Mixer, a cryptographic tool designed to handle authentication for third-party applications, into Bluemix

151119 paris attacks 2

How tech led to the death of France's public enemy No. 1

The suspected mastermind of last week's terror attacks in Paris, Abdelhamid Abaaoud was tracked with the aide of an abandoned phone

sdn nsa monitoring spying

Encryption is not the enemy

The fearmongering after last week's attacks in Paris does nothing to improve security and helps the terrorists' cause

Security online

Adobe patches flaws in ColdFusion, LiveCycle Data Services, and Premiere Clip

Adobe fixed important vulnerabilities in its ColdFusion application server, LiveCycle Data Services framework and Premiere Clip iOS app.

spying eye

How Cisco is trying to keep NSA spies out of its gear

Cisco's suppliers have stronger security requirements, and customers will soon be able to inspect products before buying

Load More