Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

ninja ww 08

Obama authorizes sanctions against hackers

The sanctions will help the U.S. go after overseas attackers when foreign governments can't step in


nac 1

Review: Portnox, Extreme lead NAC pack

Network Access Control (NAC) products continue to get better and easier to use

thermometers cold warm hot temperature

6 reasons why heat-based attacks won't happen

Oh, those security researchers, always coming up with exotic new ways to penetrate systems -- but the BitWhisper attack on air-gapped systems is especially far-fetched

GitHub still recovering from massive DDoS attacks

The attacks, which started Thursday, were particularly aimed at two GitHub-hosted projects fighting Chinese censorship

Slack hacked, compromising users' profile data

After suffering a hack last month, the company has added two-factor authentication

Congress moves quickly on cyberthreat information sharing

A House committee approves a second bill, despite concerns about consumer privacy

privacy eye look

CISA will mean more surveillance, not fewer cyber attacks

The proposed Cybersecurity Information Sharing Act would make us less secure

careless workers security

Security best practices for users is your first line of defense

End-users are woefully unprepared to deal with phishing scams, social engineering schemes that are the cause of a lot of breaches

security open lock

The state of open source security

Recent high-profile vulnerabilities have put the lie to the 'many eyes' theory -- but also driven real progress in securing the open source ecosystem

Zero day, Web browser vulnerabilities spike in 2014

The good news: More than 83 percent of vulnerabilities had patches ready when the flaws became public

Dell support tool put PCs at risk of malware infection

Weak authentication in Dell's System Detect utility could have enabled drive-by malware attacks

Flash-based vulnerability lingers on many websites three years later

A large number of developers have failed to patch their Flash apps against a vulnerability that can be exploited to target Web users

Security startup records a year's worth of network data

Lightweight sensors from ProtectWise record network data so security professionals can go back and analyze it

Google catches bad digital certificates from Egyptian company

An Egyptian company issued unauthorized digital certificates for Google's services, a major no-no

hammer 154045038

Hardware exploits may be a sign of threats to come

Hardware exploits like Rowhammer are rare, so companies don't take them seriously, but they should -- because more are looming

intro title

Watch out for these 9 information security threats

Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security...

broken link breaching weakest link connection vulnerability 000004213740

Upgrade now: Older OpenSSL versions vulnerable to FREAK attack

The OpenSSL project shared the high-severity vulnerability privately in advance as part of a post-Heartbleed strategy for security disclosures

Premera, Anthem data breaches linked by similar hacking tactics

Security analysts last year saw a fake domain spoofing Premera's name

privacy eye look

Security guru Bruce Schneier: Your privacy is already gone

In 'Data and Goliath,' one of the world's foremost security experts piles on the evidence that privacy is dead -- and proposes a detailed plan to restore it

Load More