Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

security lock code
Intel logo

YouTube potato chips

Privacy groups target kids advertising disguised as YouTube content

Marketing companies are targeting children worldwide on YouTube with advertising disguised as other content, an "unfair and deceptive" business practice, three privacy groups said in a complaint to the U.S. Federal Trade Commission.

NSA headquarters

Ex-NSA contractor hoarded two decades' worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.

courtroom gavel computer stock

Apple sues Amazon supplier over fake iPhone chargers

In a federal lawsuit, Apple asserted that nearly all the iPhones, chargers and cables it surreptitiously purchased from online retailer Amazon were fakes.

Internet cyber security

RASP rings in a new Java application security paradigm

Runtime-based technologies use contextual awareness to boost Java application security

In-vehicle-infotainment tesla

Tesla ratchets up fully autonomous cars; watchdog group wants tighter safety regs

On the same day Elon Musk said Tesla's new vehicles will have fully-autonomous capabilities, a consumer watchdog group called on the California Department of Motor Vehicles to prohibit cars without human driver capabilities.

Security (3)

Free tool protects PCs from master boot record attacks

A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.

windows server download update install

3 ways Windows Server 2016 is tackling security

Windows Server 2016 could be a generational shift in security on par with Bill Gates’ introduction of Trustworthy Computing in 2002.

1 immersive

Why you need to develop an immersive security strategy

Immersive security is a radical approach that utilizes advanced visualization techniques to enable a multidimensional situational awareness of the network. By being ‘in the data’ security professionals are able to better and more...

Common crypto mistakes criminals makes

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code

russian police

LinkedIn blames Russian hacking suspect for 2012 breach

A suspected Russian hacker arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says.

yahoo mail

Yahoo asks US for clarity on email scanning controversy

Yahoo is asking that the U.S. government set the record straight on requests for user data, following reports saying the internet company has secretly scanned customer emails for terrorism-related information.

clinton hacked emails

Russian hacker group used phony Google login page to hack Clinton campaign

A Russian hacking group used spearphishing to steal the Gmail login credentials of Hillary Clinton campaign staff, and that may be how campaign emails now being released were stolen, according to Secure Works.

Security online

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.

robert gates

Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates

Gates, also a former U.S. Secretary of Defense, also regaled the IT audience at the Gartner Symposium/ITxpo with tales of old tech, including helicopter pilots having to grab film capsules before they hit the ground.

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

20151027 oracle cloud on building

Oracle fixes 100s of vulnerabilities that put enterprise data at risk

Oracle has released another large batch of patches, fixing many critical vulnerabilities in enterprise products that are used to store and work with critical business data.

Traits and Talents of Devops Ninjas

Cybersecurity 'ninjas' value challenges, training and flexible schedules over pay

Challenging work, skills training and flexible work hours are important for all cybersecurity employees, but especially so for the highest skilled workers, according to a report released today

IoT botnets powered by Mirai continue to grow

Level 3 Threat Research has noted an uptick in activity by new IoT botnets backed by Mirai malware, with some attacks enlisting 100,000 hijacked devices.

Load More