Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

security target

Google to turn on encryption by default in next Android version

Law enforcement would have to approach a device's owner since the encryption keys are stored on the device


Security alert for incoming threats.

CloudFlare aims to prevent future Heartbleeds with Keyless SSL

CDN mavens CloudFlare have a new system for implementing SSL in the cloud while keeping the private keys elsewhere

lawyer

Feds seek expanded PC hacking powers for criminal investigations

The FBI and Department of Justice are mulling rules that would allow broader opportunities for domestic law enforcement to hack PCs as part of a criminal investigation

Adobe releases previously delayed security updates for Reader and Acrobat

The updates fix eight vulnerabilities, including some that could be exploited to infect computers with malware

Microsoft Windows broken

Microsoft pulls botched KB 2982385 patch, MS 14-055 for Lync 2010

The installer for MS 14-055 on Lync Server 2010 says 'Windows can't verify the publisher of this driver software'

Apple turns on iCloud two-step verification after nude selfie scandal

Two-step verification is not mandatory though Apple recommends the added security protection

Court throws out $368.2 million patent award against Apple

A lower court made mistakes in defining the value of the patented technology asserted by VirnetX, an appeals court says

Security hole

New NSA-funded programming language could close long-standing security holes

Wyvern securely rolls five programming languages into one.

data breach

Why retailers like Home Depot get hacked

Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say.

Hacking stealing password data.

5 reasons why hackers own your organization

The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere

Apple Watch under scrutiny for privacy by Connecticut attorney general

Attorney General George Jepsen is particularly concerned about the protection of health information collected by the new wearable device

Data loss detection tool mines the ephemeral world of 'pastes'

Thousands of email addresses are leaked every day on Pastebin unknown to most users

How network virtualization is used as a security tool

As VMware sells its network virtualization software, it's finding that security is a big driver for adoption

3 security practices IoT will disrupt

The rush to bring IoT products to market has created a new wave of security issues

Cloud computing security lock.

Cloud security: We're asking the wrong questions

The outcry over celebrity nudes blames a new scapegoat -- the cloud -- for our security woes, but underlying causes run deeper

Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates

The new Flash Player update patches 12 vulnerabilities, many of which could allow remote code execution

Home Depot confirms breach of its payment systems

Customers will not be held responsible for fraudulent charges, the company said

IBM secures SoftLayer with Intel trusted modules

Intel's Trusted Execution Technology helps the IBM cloud service meet stringent compliance and auditing regulations

11 open source security tools catching fire on GitHub

Malware analysis, penetration testing, computer forensics -- GitHub hosts a number of compelling tools for securing computing environments of all sizes

Load More