Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Digital Key security
Shell gas station Shell petrol station

thieving magpie

U.S. and U.K. spy agencies have been intercepting in-flight phone calls for years

U.S. and U.K. spy agencies have been monitoring in-flight mobile phone users for years, according to new revelations from the trove of documents leaked by former NSA contractor Edward Snowden.

cryptolocker -ransomware - flickr

Fighting ransomware: A fresh look at Windows Server approaches

Make sure your backup files really work -- test them! -- or else they will be no use to you in this situation.

Turkish flag Turkey

A Turkish hacker is giving out prizes for DDoS attacks

A hacker in Turkey has been trying to encourage distributed denial-of-attacks by making it into a game, featuring points and prizes for attempting to shut down political websites.

US Capitol

Democrats unveil bill to probe Russia's role in alleged election hacks

U.S. lawmakers are pushing for a government probe into whether Russia may have interfered with the presidential election by hacking high-profile political targets.

clock and calendar montage

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers.

barrack obama 2016

Obama's cybersecurity recommendations a small step forward, but need teeth and political willpower

Last week's report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by $4 billion over the next decade...

Android N statue

Latest Android security update fixes Dirty COW, GPS vulnerabilities

The monthly Android security update released this week fixes the serious Dirty COW privilege escalation attack that could allow malicious apps to take full control of devices.

gift container

The security gift guide

Give the gift of security, so people will give you the gift of not asking for help and advice.

49ers defense

Playing cyber defense is not enough to win

Where to draw the line when it comes to offensive cyberattacks

img 20161206 181722 01 01 01

Malicious online ads expose millions to possible hack

Since October, millions of internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install other forms of malware, according to security firm ESET.

video

Facebook encrypted messages: Setting up Secret Conversations in Messenger

Even Facebook lets you have a little privacy, letting you send encrypted messages using the Secret Conversation feature in Facebook Messenger. Here’s how it works.

linkedin microsoft logo

EU approves LinkedIn deal after Microsoft makes concessions

EU regulators approved Microsoft's acquisition of social network LinkedIn on the condition that the U.S. company abide by several minor concessions.

dsc05314

Trump’s plan for protecting IT jobs raises hopes, fears

President-elect Trump is threatening tariffs and promising H-1B visa reform, but may be offering carrots as well, namely tax incentives.

cyber security insurance protection

Big Switch adds security perimeter around SDN data center

Big Switch Networks today unraveled a wide-ranging group of products aimed at mitigating security attacks, scrutinizing cloud and container environments and improving its existing SDN-based monitoring software.

ibm pc dos 1.0 screenshot

Say goodbye to the MS-DOS command prompt

It had a good 36-year run, but its day is done.

Apple iPhone 5S (1)

App developers not ready for iOS transport security requirements

A month before Apple is expected to enforce stricter security requirements for app communications in iOS, enterprise developers don't seem ready to embrace them, a new study shows.

blockchain bitcoin

Getting started with blockchain smart contracts

Smart contracts based on blockchain can help you cut costs and waste and offer some much-needed visibility into your supply chain. Here’s how they work.

 ibm watson

IBM amps-up Watson cybersecurity experiences

IBM Watson goes to the enterprise with 40 companies now adding smarts to the cognitive system.

Load More