Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

security and privacy icon
low tech threats

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

sony pictures studio tour

Sony admits employees' personal data may have been compromised by breach

Weeks later, Sony Pictures is telling employees what they already know about the scope of data that was compromised by attackers

crowd

Creative defense: Crowdsource your hackers

A startup launched by security veterans enables any organization to set up a cost-effective bug bounty program and pay skilled freelance white hats to find vulnerabilities

android apple lock

How to secure Apple and Android mobile devices using 802.1X

Understanding all the 802.1X client settings can certainly help during deployment and support of an enterprise network

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

Today's multiheaded malware needs a multipronged solution

By analyzing and predicting process behavior, a new approach to endpoint protection overcomes the limitations of traditional AV detection and sandboxing

anonymous masks

In threat assessment, the 'who' matters

Knowing who could come after you helps you prepare the appropriate defenses and response. (Insider; registration required)

Security group plans for a future without passwords

The FIDO Alliance encourages stronger use of biometrics and hardware tokens instead of passwords to identify users

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

internet things

5 ways to prepare for Internet of things security threats

Excitement over IoT benefits may soon give way to concern over the uncertain security outlook.

balloons in sky

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from big data analytics, but also massive potential for exposure. Here's how to protect yourself and your employees

NSA spy program targets mobile networks worldwide

The NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden....

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords, and an image associated with Sony Pictures Entertainment, researchers said

captcha2

Google says bye bye, CAPTCHAs, well, mostly

If you're tired of typing in letters and numbers from those distorted boxes, you're in luck

anonymous spy privacy security

Blame China for the NSA's spying campaign on us all

'@War: The Rise of the Military-Internet Complex' explores the origins of the NSA’s war on privacy -- and Silicon Valley's complicity

lighthouse night warning

How to maintain security in continuous deployment environments

If you wait till tomorrow to secure what continuous deployment took live yesterday, hackers will infect your application today

Load More