Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

security code big data cyberespionage byte
le canard enchaine

ashley madison

Ashley Madison misled users with a fake security award

It’s never a good sign when a website markets itself with a phony security award. But that’s what Ashley Madison did prior to last year’s massive data breach.

infblad

Epic Games forum hack underscores the need to install security patches

A recent data breach at Epic Games may have been avoided if the company had simply installed a security patch.

cyber crime hacker image

Ain’t no mountain high enough to keep cyber attackers from gettin’ to you

Cyber criminals take a passionate stance when approaching your data: higher mountains and lower valleys won’t keep them away.

internet security thinkstock 1200w

Nginx web server upgrade focuses on web security, JavaScript configuration

Nginx Plus Release 10 adds a web app firewall, IP transparency, and support for the nginScript configuration and control language

clicks pageviews traffic denial of service ddos attack

Imperva: Application layer DDoS attacks are on the rise

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.

elctrical plug shock

Side channel power, the new security front

Previously seen as a way to crack system security, power analysis has been enlisted as a new form of protection for information technology.

6 social media

Groups oppose US plan to collect social media info from visitors

Civil liberties and tech advocacy groups have opposed a move by the Department of Homeland Security to collect social media information from certain categories of visitors to the U.S.

NSA headquarters

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales when they leaked valuable cyberweapons allegedly stolen from the National Security Agency.

nup 172256 0396

Republicans subpoena three tech companies over Clinton emails

Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.

healthcare security

Many hospitals transmit your health records unencrypted

A new survey by a health organization shows that only about 68% of acute providers and 48% of non-acute providers encrypt patient data -- and up to 22% of hospitals don't have firewalls.

snow globe security

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private-sector companies globally spent more than $75 billion on security software to safeguard their systems and data. Has all that spending made private sector data and systems any safer?

privacy eye look

EFF condemns Windows 10 data collection

The Electronic Frontier Foundation is lambasting Microsoft over Windows 10's telemetry technology, and wants it to "come clean" with customers.

mit probablistic patches code

Blame it on your brain: Researchers discover why we ignore PC security warnings

A BYU study finds that you'll most often ignore security warnings when you're busy, which is bad for both the developer and you.

car smartphone

A push for the less-hackable car

Automotive cybersecurity finally looks like it is on the front burner. But a host of improvements need to be made before the connected car is even relatively safe from hacks.

1 safe

8 tips for keeping your data safe with Identity and Access Management

With the proliferation of cloud applications, IAM solutions are a necessity.With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly...

devops

Automate, integrate, collaborate: Devops lessons for security

Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well

team teamwork global workforce

How to get your network and security teams working together

Your network and security teams may have different goals and objectives, but as networks grow more complex, it’s time to get these two teams on the same page to help avoid miscommunication around security threats.

Millennials sceptical of security and less savvy than baby-boomers

Millennials are less cyber security savvy than baby-boomers at home and at work, according to a survey.

Load More