Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

DOJ
data protection

1 home network

6 tips to protect your home network

Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure...

161118 pompeo 1

Pompeo sworn in as CIA chief amid opposition from surveillance critics

Mike Pompeo was sworn in late Monday by U.S. Vice President Mike Pence as the new director of the Central Intelligence Agency, amid protests from surveillance critics who worry about his conflicting views on a number of key issues. ...

data breach predictions

How big data can drive the future of cybersecurity

Data science experts and big data enthusiasts are excited and prepared for a future that's becoming increasingly connected to the web.

apple 1839363

Apple quashes bugs in iOS, macOS and Safari

Apple on Monday updated macOS Sierra to 10.12.3, patching 11 security vulnerabilities in the desktop OS and released iOS 10.2.1, an update to fix 18 security flaws in the mobile OS.

13959900047 bede3e5ba4 o

Trump names net neutrality foe Ajit Pai to lead the FCC

President Donald Trump has named Commissioner Ajit Pai, an outspoken opponent of the FCC’s net neutrality rules, as the next head of the agency.

yahoo mail

Yahoo pushes back timing of Verizon deal after breaches

Verizon’s planned acquisition of Yahoo will take longer than expected and won’t close until this year’s second quarter, the internet company said on Monday.

primary tsa

10 of the latest craziest and scariest things the TSA found on your fellow travelers

Interestingly the TSA finds some amusement or amazement in these finding as it now posts its own Top 10 Most Unusual Finds which outlines the most “dangerous and often times wacky items” it has kept off commercial airliners.

video

How to Clean-install Windows without Bloatware

You can get rid of bloatware or other troublesome software by doing a clean install of Windows 10. Here’s how it works.

Internet Cafe China (4)

China goes after unauthorized VPN access from local ISPs

China is patching a hole in its online censorship apparatus. The country’s regulators are going after unauthorized internet connections, including tools known as VPNs (virtual private networks) that can bypass China’s efforts to...

ford fusion av 01 hr

DOT designates 10 new U.S. proving grounds for self-driving cars

The Department of Transportation has designated 10 proving ground pilot sites to encourage testing and information sharing about automated vehicle technologies, including optimal big data usage.

IBM Security to buy risk-visualization firm Agile 3 Solutions

IBM Security plans to buy San Francisco-based Agile 3 Solutions, which makes software for visualizing data risk for analysis by senior executives.

05 tools

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs.

honda ridgeline interior

How vulnerable are you behind the wheel of your connected car?

Remember when all you had to worry about with your car is getting an oil change every 3,000 miles. Today’s connected cars are miles ahead technologically speaking of those “dumb” vehicles, but drivers could see a bumpy ride if thieves...

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

best home security cameras

6 steps to secure a home security camera

No device is 100 percent immune from vulnerabilities, but there are some simple, common-sense steps you can take to protect IP-based cameras.

img 20170120 171638 01

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging.

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

screen shot 2017 01 20 at 10.36.38 am

Spanish police nab suspected hacker behind Neverquest banking malware

Spanish police have arrested a suspected Russian hacker of developing the Neverquest banking Trojan, a malware targeting financial institutions across the world.

Load More