Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Password entry
windows 10 s start menu

img 20170515 140831 01

To stop future ransomware hacks, CIOs first need to 'swat the mosquitoes'

All too often IT departments can miss the the crucial signs of an incoming ransomware attack. What CIOs can do to avoid becoming the victim of the next global malware hack.

healthcare it conferences

The 4 biggest healthcare IT headaches

Experts in healthcare IT and compliance discuss the top challenges for hospitals and healthcare facilities and what CIOs can do to address them.

patching against ransomware

WannaCry reminds CIOs to stay on top of patching

Cybersecurity experts say delaying or even ignoring a patch Microsoft released two months ago paved the way for the current ransomware. So why don’t CIOs keep on top of patching?

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

pc antivirus

Yes, you still need endpoint malware protection

While operating systems and apps are more secure, the need for endpoint security remains.

panda security

55% off Panda Security Ransomware and Virus Protection Products for Home Users - Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using this special code at checkout.

facebook stock headquarters building

Facebook fined €110 million for misleading European Commission over merger

Facebook must pay a €110 million (US$123 million) for misleading the European Commission during an investigation of its takeover of WhatsApp.

screen shot 2017 05 13 at 11.28.04 am

How a 22-year-old accidentally flipped the WannaCry kill switch

The malicious WannaCry ransomware attack wreaked havoc but was ultimately contained thanks to an accidental kill switch activation.

Maginot Line

Dell shifts security focus to data itself

Dell Data Guardian is a new type of security product that eschews Maginot-line-type walls and instead goes for protecting the data itself. Each file has its own encryption and security policy. This granular approach allows for a...

hacker, hackers, hacking

Shadow Brokers teases more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.

wannacry ransom screenshot

Will macOS protect you from ransomware attacks?

The recent WannaCry ransomware attacks on Windows have some Mac users wondering if they are safe. Is macOS secure from ransomware attacks?

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

wannacry ransom screenshot

WannaCry: Sometimes you can blame the victims

Last week’s big malware outbreak caused a lot of damage, but organizations that made good decisions ahead of time weren’t affected.

ransomware
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

privacy

Missing protection: Corporate B2B privacy policies

The general lack of such policies is a major security hole.

Facebook headquarters

Facebook hit with maximum fine for breaking French privacy law

The French data protection watchdog has imposed its harshest penalty on Facebook for six breaches of French privacy law.

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

Load More