Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Hammer breaks glass
encryption

UCLA Phase Stretch Transform algorithm

UCLA just open-sourced a powerful new image-detection algorithm

The algorithm helps computers 'see' in ways that human eyes can't, and could be used in face, fingerprint and iris recognition for high-tech security

microsoft headquarters

Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .Net Framework

February’s Patch Tuesday brought 12 security bulletins, five of which Microsoft rated critical

video

Setting up a Windows 10 picture PIN

How cool is it to draw on a picture to log into your Windows 10 PC? It's a lot cooler than remembering a bunch of letters and numbers. Here's how to set it up.

Internal Revenue Service IRS tax filing form 1040

Identity thieves obtain 100,000 electronic filing PINs from IRS system

The automated attack using previously stolen personal data attempted to obtain E-file PINS for over 460,000 people

seesaw balance lego

Let’s bring back the balance between IT and business

IT's past abuses haunt it in the present, but it doesn't have to stay that way

gmail icon

Google adds warning to unencrypted emails

Users will also be told when they may be conversing with someone who is not a real person

3648438218 2ecc0c3414 o

US government wants to sharply increase spending on cyber security

The $3.1 billion plan calls for replacing outdated IT infrastructure and recruiting cyber security experts into government roles

ecommerce thinkstock

Adwind evolves to offer cyber criminals one-stop shop for malware

Remote administration tool Adwind is back on the market, this time as JSocket, an online marketplace selling malware and a slew of other tools

security 2016 cybercrime

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

Java logo

Java installer flaw shows why you should clear your Downloads folder

Older versions of the Java installer were vulnerable to binary planting in the Downloads folder

DHS hack

Report: Hacker steals, posts personal details on 9,000 DHS employees

Hacker says he will next post the records of 20,000 FBI workers

Cyber criminals cash out using PowerShell, other legitimate tools

Kaspersky Lab found three cyber crime gangs using customized malware and APT-style reconnaissance to get the stolen money into their pockets

video

I forgot my Windows 10 password!

Forgetting your Windows 10 password isn't the disaster it used to be. Windows lets you get back on track with a pretty easy reset process. Here's how it works.

technologies cia wants 1

8 hot technologies the CIA wants

In-Q-Tel, the CIA’s investment arm, is interested in expertise ranging from 3D printing of electronics to reconnaissance drones that can hover indefinitely

video

Bypassing the Windows 10 password with a PIN

There's an easier way to get into Windows: setting up a numerical PIN, just like you'd use with a bank ATM. Here's how to do it.

docker

Docker goes rootless -- and that's a good thing

Containers will no longer have to be run as root in Linux, thanks to a new feature in Docker 1.10

automated security defense protection

Dell BIOS verification extends security focus

Dell is adding BIOS protection to its suite of security protections. One solution handles advanced authentication, encryption, and malware detection along with BIOS verification

cloud security lock

How to secure Amazon Web Services like a boss

Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how

Load More