Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

sprinters
e res id card

Old red brick    176848513

Five sue Apple over Error 53 and bricked iPhones

Error 53 is triggered when users update or upgrade to a new version of iOS, and the operating system detects that either the owner or a third-party shop has changed components in the iPhone.

connected cars ts

White-hat hackers key to securing connected cars

Federal regulator warns of security and privacy risks in connected cars, calling on manufacturers to partner with white-hat hackers to seek out flaws and vulnerabilities.

Android Security Audit

7 Android tools that can help your personal security

Forget security suites: These seven sensible tools are all you really need on your Android phone to stay safe.

heart mousetrap

Risky business? Online dating fraud dips during Valentine's Day

Good news, online daters, according to research conducted by device intelligence and fraud prevention company iovation, fraud on online dating sites is lower leading up to Valentine's Day.

hardware security embedded circuit board integrated controller

Hackers of two Ukrainian utilities probably hit mining and railroad targets, too

The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.

Suzan DelBene

ENCRYPT Act co-sponsor learned tech ropes at Microsoft

Rep. Suzan DelBene, one of four congressional sponsors of the ENCRYPT Act, which would preempt state and local laws banning encryption on smartphones, cut her teeth in mobile communications for Microsoft.

Internet Explorer

It's official: Older versions of IE are now at risk

Microsoft this week made good on a 2014 promise and withheld security updates from users of older versions of Internet Explorer.

obama

Obama wants more cybersecurity funding and a federal CISO

In the final budget of the Obama administration, the White House is looking to boost spending on security, hire more experts and partner with the private sector.

world encryption

Schneier: terrorists will switch to more secure alternatives to avoid encryption backdoors

A study shows that if the U.S. mandates backdoors to decrypt secret messages, there are hundreds of alternatives that are made outside the reach of U.S. law.

guy in industrial control room

Indegy finds out when industrial controls go bad (think Stuxnet)

Israeli startup Indegy monitors devices on industrial control networks to detect when their configurations have changed as a way to know when the machines are compromised, an attack vector exploited by the Stuxnet worm that took down...

vault key encryption

Study finds that anti-crypto laws won't work on an international stage

If the U.S. government restricts the export of encryption technology, or mandates back doors in U.S.-made encryption products, then both legitimate customers as well as criminals and terrorists can easily switch to encryption products...

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets...

voting new hampshire

Voter targeting becomes voter surveillance

Political campaigns have discovered what marketers of all products know – the better you know your customer, the better you can target the advertising and increase the chances of a sale. But privacy advocates say voter surveillance is...

https encrypted

Which security products do enterprises expect too much from?

Attackers will thank you for enabling them to bypass firewalls and VPNs by allowing infected laptops to send hostile packets through both into your network.

7 encryption

House bill would prevent patchwork of state laws banning smartphone encryption

Four bipartisan members of Congress introduced legislation this week to preempt a potential patchwork of state and local government laws banning encryption on smartphones.

s2015092871324 100617490 orig

Facebook withdraws Free Basics from India after regulatory debacle

Facebook has withdrawn Free Basics from India, two days after the country's telecommunications regulator prohibited the differential pricing of data depending on the content or application that is being accessed.

150817 google marshmallow 07

Android root malware widespread in third-party app stores

Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.

encryption

Bill filed in Congress would ban encryption backdoors

Four Congressmen are proposing that states be forbidden to ask manufacturers to install encryption backdoors on their products outfitted with the technology.

Load More