Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

merger palo alto light cyber
robot hacking security A.I.

clock and calendar montage

February 2017: The month in hacks and breaches

An unsecured MongoDB database, sluggishness about disclosing and patching vulnerabilities, and “I was just curious” were among the contributing factors to the month’s incidents.

terminator action figure

5 Terminator movies have taught us nothing

In a new study of leading robot manufacturers, most had serious security vulnerabilities which could allow hackers to take over and reprogram the robots to spy on their owners, cause property damage, or even attack humans.

magnifying glass stock prices

Microservices offer speed and flexibility, but at a price

The benefits of microservices include speed to market, lower costs, and greater flexibility -- but microservices also come with their own set of security and management challenges.

3147352

Trump says offshoring displaces ‘our best’ American workers

President Donald Trump promised Tuesday to crack down on offshore outsourcing, which he blamed for displacing American workers. But he offered no specifics on what he would do.

globe flags

Global cybercrime prosecution a patchwork of alliances

Global efforts to combat cybercrime are built on a patchwork of alliances, taskforces and personal relationships.

screen shot 2017 02 27 at 4.33.35 pm

Smart teddy bear maker faces scrutiny over data breach response

Did a toymaker ignore warnings about a data breach? That’s a key question swirling around Spiral Toys, a company behind a line of smart stuffed animals that security researchers worry can be easily hacked.

11341223006 26eab779ec o

New FCC chairman: Net neutrality rules were a 'mistake'

The U.S. Federal Communications Commission's net neutrality rules passed two years ago were a "mistake" that caused uncertainty for the broadband industry, the agency's new chairman said.

ransomware ts

Trend Micro report: Ransomware booming

The profitability of ransomware made it the top cyber threat last year in two categories: the number of attacks and the amount of money generated for crooks, according to a Trend Micro lookback on data it collected from its customers....

fake email

A better security strategy than ‘know your enemy’: Know your co-workers

Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.

1 threatening

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

trump cpac

Will a cyber crisis add to chaos of Trump’s first 100 days?

Forrester Research predicted last fall that the new president would confront a “cyber crisis” within the first 100 days. Experts say that’s an easy call – depending on how you define a crisis.

170227 mwc 160433

This tiny chip could revolutionize smartphone and IOT security

Engineers at South Korea's SK Telecom have developed a tiny chip that could help secure communications on a myriad of portable electronics and IOT devices.

screen shot 2017 02 27 at 4.34.08 pm

Smart teddy bears involved in a contentious data breach

If you own a stuffed animal from CloudPets, then you may have been hacked. The company’s toys -- which can receive and send voice messages from children and parents -- have been involved in a serious data breach dealing with more than...

e2e

Google shifts on email encryption tool, leaving its fate unclear

Google is asking developers to take over its effort to make end-to-end email encryption more user friendly, raising questions over whether it’ll ever become an official feature in the company’s products.

170227 mwc 160634

SK Telecom pushes for interoperable quantum crypto systems

SK Telecom and Nokia have developed a prototype quantum cryptography system that combines the South Korean company's quantum key server with an encryption device from Nokia.

cog systems d4 secure htc a9 ip address

Cog Systems offers more secure version of HTC A9 smartphone

It sounds like a smartphone user's worst fear: Software that starts up before the phone's operating system, intercepting and encrypting every byte sent to or from the flash memory or the network interface. This is not some new kind...

rsa conference 2017

RSA Conference is a timesaver

For our manager, the annual security gathering is a great way to get quality time with vendors.

07 insider

What should an insider risk policy cover?

To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts.

Load More