Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Cleaning up botnets takes years, if ever, to complete

The cleanup effort around Conficker shows how hard it is to eradicate a botnet

Yahoo tackles large 'malvertising' campaign in its ad network

Ads with malicious code may have appeared across Yahoo's sites


Counterterrorism expert says it's time to give companies offensive cybercapabilities

The U.S. government should arm private businesses with cyberwarrants, allowing them to hack back

1 title

Social Engineering: 6 commonly targeted data points that are poorly protected

Now in its sixth year, the Social Engineering village at DEF CON has always been an interesting location. Each year the village hosts talks and interactive lessons on human hacking, but the major draw is the Social Engineering Capture...

malware keyboard skull and crossbones

Newest RIG exploit kit driven by malicious advertising

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave's Spider...

cloud apps

Government CIOs fret over apps reliability in the cloud

Government officials cite security and user experience as top concerns in delivering apps in a cloud setting and pushing out online citizen services.

The Upload: Your tech news briefing for Monday, Aug. 3

Robot hitchiker attacked, abandoned... Nokia sells Here mapping business to German car makers... Spy-spotting software comes to Wall St

injection

T-Mobile caught in crossfire of injected ad war with Flash Networks

T-Mobile, Citizens Bank, thousands of other innocent companies and millions of users are stuck between shady ad networks and Google, publishers, and legitimate advertisers

00 title

A secure employee departure checklist

What steps should a business take when an employee is leaving the company in order to minimize threats to your data? Here's a checklist to securely see departing employees out the door

China clamps down on exports of drones and supercomputers

The export controls will come into effect on Aug. 15

Airbnb guest suspected of stealing $35k from San Francisco home

Incident highlights risks of renting out homes through online sites

Indian government orders ISPs to block 857 porn websites

Some Internet service providers are still in the process of implementing the order issued late Friday

windows 10

Don't get fooled into clicking phony Windows 10 upgrade emails

Fraudulent emails encouraging you to upgrade to Windows 10 will drop ransomware, not Microsoft's new OS, onto your PC.

ISP argues net neutrality rules violate its right to block content

Broadband provider Alamo tells court it has a free-speech right to exercise editorial discretion over the Web

Italian police shutter Dark Web marketplace

Italian police have shut down a Dark Web marketplace offering illegal goods ranging from child pornography to forged luncheon vouchers, and seized 11,000 bitcoin wallets worth about 1 million euros, authorities said Friday.

Black Hat 2015: Cracking just about anything

Researchers at the Black Hat conference next week will show how to crack Internet routing protocols, malware-detecting honeypots radio-frequency ID gear that gates building access, and more, but also offer tips on how to avoid...

Ad group urges FTC to reject right to be forgotten in US

Enforcing the European regulation in the US could open the door to other rules

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

neiman marcus exterior

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and file a class-action lawsuit against Neiman Marcus in the wake of...

bank cloud

Banks balance security and workflow when encrypting in the cloud

When financial institutions store data in the cloud, they use different kinds of encryption depending on security and workflow requirements, according to a new report from CipherCloud.

Load More