Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

emv chip and pin

virtual encryption 175562932

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

cyber security lock secure security

When is a flaw not a flaw? The WinRAR question

A researcher found remote code execution flaw in WinRAR, but the real question is why are you opening unknown RAR files

login prompt security screen

Dyreza malware steals IT supply chain credentials

Cyber criminals are shifting gears from online banking to companies that provide order fulfillment, warehouse management, and other services


Developers find themselves in hackers' crosshairs

Here's what enterprises need to do in order to protect their development environments from attack

steal thief theft burglar laptop secret crime

Got 'em! Researchers steal crypto keys from Amazon cloud

Researchers demonstrate a cloud provider's nightmare: How to use a rogue VM to steal crypto keys from neighbors


Insiders still pose serious security risks

Don't underestimate the damage insiders can do -- and how little prodding they need to wreak havoc


Protect your assemblies using obfuscation

Obfuscation makes your assemblies hard to reverse-engineer, thereby protecting your intellectual property

Digital Key

Newly found TrueCrypt flaw allows full system compromise

Google's Project Zero team discovered two serious flaws in the driver the TrueCrypt full disk encryption program installs on Windows systems

error signal television problem broken

The No. 1 problem with computer security

Everyone focuses on the wrong threats. You've undoubtedly been breached already, so the key is to collect data that can help you prevent attackers from succeeding again

Security in cloud computing

Online ads used for DDoS after pushing malware

Experts believe a recent large-scale distributed denial-of-service attack was launched through malicious ads displayed on mobile devices

victim of identity theft

Identity theft hit 7% of US population last year

The figure -- almost 18 million people -- is a slight increase from two years earlier

reports open source 5

5 key trends in open source

InfoWorld's Best of Open Source Software Awards shows how dependent we've become on open source for everyday infrastructure and for today's rapid-fire tech development

letter handwriting cursive mail correspondence

Tech companies claim Congressional letter did not endorse CISA

BSA said its letter to Congress urged action on cyber security legislation without endorsing a particular bill

handshake us flag

U.S., China reach 'common understanding' on cyber attacks

No one expected sanctions or an actual cyber security truce, but as agreements go, this one is as toothless as it gets

Digital Key

Cookie handling in browsers can break HTTPS security

The lack of cookie integrity verification in browsers can allow hackers to extract information from encrypted Web connections

us china relations flag

What to expect in the US-China cyber treaty

After weeks of meetings, the U.S. and China appear to be on the verge of an historic first agreement on hacking and cyber espionage, but what might a deal actually accomplish?

lock security breakthrough

Exploit broker's iOS 9 prize puts all of us at risk

Researchers deserve to get paid well for finding serious vulnerabilities, but it shouldn't be at the expense of overall software security

angry peasants mob farmers pitchforks

Privacy group calls for a boycott of tech companies supporting CISA

An activist group is on a quixotic campaign to punish tech companies who support the controversial information-sharing bill

Load More