Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

amazon echo look
nsa aerial

keyboard user security

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic and stealing sensitive information.

HTTP Chrome

Google's Chrome will soon start warning you more about HTTP pages

A Google effort to push websites to implement encryption is expanding. Starting in October, the company will flag even more HTTP connections as insecure in its Chrome browser.

Mobileye object detection

Your car will eventually live-stream video of your driving to the cloud

With a barrage of sensors, cameras and LiDAR equipment and embedded WiFi, autonomous vehicles are expected to produce an ocean of big data that could reach about 5,800 exabytes in size.

security code big data cyberespionage DDoS

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices from around the world, primarily cable modems, are vulnerable to hacking because of a serious weakness in their implementation of the Simple Network Management Protocol.

Waze police trap

Blame terrorists if you get a speeding ticket while driving in France

Drivers in France might be able to blame terrorists for their next speeding ticket, as police there crack down on mobile apps warning of their presence.

apple product family stock 2017

Apple’s confusing method of device authorization and association

Why does it have to be so difficult when all you want to do is watch an iTunes video on one of your devices?

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

ransomware

Information governance for counties and municipalities

Most county and municipal governments don't have formal information governance programs, but adoption of IG would reduce risks, lower costs and vastly improve quality of services in these organizations.

net neutrality computer internet broadband regulation goverment

FCC asks whether to 'keep, modify, or eliminate' net neutrality rules

A U.S. Federal Communications Commission proposal to kill the regulatory foundation for the agency's own 2015 net neutrality rules nevertheless asks for public comment on whether it should "keep, modify, or eliminate" basic...

20160224 stock mwc internet of things iot sign

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

ransomware

Failure to communicate helps ransomware prosper

Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.

160302 pentagon

U.S. military wants white-hat hackers to target its cybersecurity systems

The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

security tools intro slide

9 essential tools for the security-conscious mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

multifactor authentication

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

botnet bots

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.

rsa 2017 v2 series branded lg

The state of privacy and security in an ever-evolving world

Privacy and security have evolved. We are seeing various breaches that are devastating organizations. How can you secure your data in a world full of mobile devices, IoT, and the cloud?

owasp

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

Load More