Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

the 16 worst data security breaches
video

The 16 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 16 breaches and their overall impact on customers or employees.

template c100.00 13 28 47.still001
video

Mingis on Tech: The alphabet soup of mobile device management

Do you know your MDM from MAM and EMM? It's all about BYOD, and how companies can keep data safe while making it easier for workers to be productive with their own devices.

fighting office workers man women argue angry mad upset team

Waah! WannaCry shifts the blame game into high gear

Every security crisis presents the opportunity to point fingers, but that's just wasted energy. The criminals are at fault—and we need to work together to stop them

nsa aerial

Microsoft blames US stockpiled vulnerability for WannaCry ransomware attack

The stockpiling of vulnerabilities by governments is a big problem, the company said

ransomware at your service 3

WannaCry ransomware slipped in through slow patching

IT teams have a gap of several weeks between when patches are released and deployed, giving criminals time to make WannaCry a reality

5 api automated robot keyboard

Why snafus like HP’s keylogger will happen again

The problem wasn't the length of time it took HP to respond to security researchers—it's that unreviewed code proliferates supply chains everywhere

0 iot intro smart appliances

Six things you need to know about IoT security

It’s simple: IoT makes our lives easier, and security flaws do not

Digital Key encryption

New ransomware Jaff demands $3,700 payments

The new ransomware program is distributed via mass email spam sent by the Necurs botnet

Digital Key encryption

Microsoft finally bans SHA-1 certificates in Internet Explorer, Edge

All SHA-1 certificates that chain back to publicly trusted certificate authorities will be blocked, but enterprise and self-signed certificates won't be affected

angry hacker

DDoS or bust! Angry gamers come for IT

When gamers threaten to bring down the system, a tech team battens down the hatches and prepares for the worst

security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data

Microsoft rushes emergency fix for critical antivirus bug

Microsoft's security team fixed a type confusion flaw in its malware engine that affects practically all of its security products

quell cyber attacks primary

How the Macron campaign slowed cyberattackers

Did the French president-elect's security team use cyberdeception techniques to fight off phishing attacks? Submitting fake credentials definitely qualifies

security hacker privacy

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data when they enter the United States

cybersecurityshutterstock 380217166

New Android security report is alarming, but not because of the amount of malware

A new security report says that more than 3.5 million instances of malware will land on Android this year, with most phones unequipped to stop them

dsc04857

Top tips for finding the right cybersecurity products

Security pros offer advice from the trenches of a noisy, hype-filled market

keyboard user security

Snake cyberespionage malware is ready to bite Mac users

One of the most sophisticated cyberespionage groups is readying its malware framework to attack macOS

hacker login password cliche

NIST to security admins: You've made passwords too hard

Passwords may not be dead, but the latest NIST guidelines promises a less frustrating and more secure authentication future

170504 blackberry keyone
video

The BlackBerry KeyOne: A surprising phone with a hardware keyboard

The BlackBerry KeyOne packs in productivity features and is worth a look if you're in the market for a new phone. It's the first time BlackBerry's iconic keyboard has been paired with Android.

Gmail Google Mail

Sneaky Gmail phishing attack fools with fake Google Docs app

Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts

Load More