Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Pawn Storm cyberespionage group increases activity, targets NATO

New attacks were observed this year from the group, including against people with links to the White House

The Upload: Your tech news briefing for Friday, April 17

WikiLeaks publishes stolen Sony info...IBM opens up threat data...China suspends rule on foreign IT vendors


Whistleblowers at risk when using US government websites

The ACLU is recommending that more than two dozen websites be upgraded to use encryption

IBM opens up its threat data as part of new security intelligence sharing platform

The IBM X-Force Exchange platform will allow companies to share and compare data from security incidents

Data breach notification bill could weaken consumer protections

A House committee approves the legislation despite criticism from digital rights and consumer groups

New malware program Punkey targets point-of-sale systems

All signs point to an increase in the number of memory scraping malware programs infecting PoS terminals to steal payment card data

YouTube flaw allowed copying comments from one video to another

Google has fixed the flaw and paid a bug bounty

Dropbox to pay security researchers for bugs

Dropbox has not set a maximum reward

AirDroid app fixes severe authentication vulnerability

The flaw affected AirDroid versions 3.0.4 and earlier

Don't look now, but ATMs are about to get a cloud makeover

NCR uses Android and a thin-client model to bring yesterday's bank machines into the cloud era

VMware helps CIOs tunnel their way to more secure mobile apps

VMware's goal is to make it easier for administrators to control what apps and resources mobile users can access

Microsoft Patch Tuesday: The patches just keep coming

Microsoft's latest round of patches covers Internet Explorer, Windows, Office and other Microsoft products

Web app attacks, PoS intrusions and cyberespionage leading causes of data breaches

Phishing attacks continue to be effective, but mobile threats are not a big concern, according to a Verizon report

U.S. business group urges China to loosen data-storage policies

China is considering IT policies that could further restrict foreign businesses, according to a U.S. lobbying group

Deterrence will keep a lid on cyberwar, former spy chief says

Ex-U.S. national intelligence director Dennis Blair likened the standoff to mutually assured nuclear destruction

RadioShack presses ahead plan for sale of customer data

The sale of the personal data was withdrawn from a previous auction

Windows vulnerability can compromise credentials

An old flaw in Windows can still be exploited, according to Cylance

New cyberthreat information sharing bill may be more friendly to privacy

The new bill still allows companies to share some unnecessary personal information with government agencies, a critic says

Files encrypted by CoinVault ransomware? New free tool may decrypt them

Dutch police obtained CoinVault decryption keys and shared them with the world

Chinese hacker group among first to target networks isolated from Internet

APT 30 has been operating since 2005 without significantly changing its attack methods, FireEye said

Load More