Windows Security

Windows Security | News, how-tos, features, reviews, and videos

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

In desperation, many ransomware victims plead with attackers

TeslaCrypt creators negotiated with victims, earned over $76,000 in two months

cyber security lock glow data

How one CIO stays a step ahead of cybersecurity threats

Here's how Digineer's CIO stays one step ahead of common cybersecurity threats.

Congress moves forward on cyberthreat sharing bill despite privacy concerns

The House may vote this week on a bill that would allow shared cybertheat information to be passed to the NSA and law enforcement agencies

All major browsers hacked at Pwn2Own contest

Adobe Reader and Flash Player fell as well

EMET security tool updated to prevent VBScript God Mode attacks

Microsoft was forced to release EMET 5.2 again because customers experienced issues with the first variant

Windows systems are also vulnerable to FREAK attacks

A recently disclosed vulnerability in SSL/TLS implementations also affects Microsoft's Schannel crypto library and Internet Explorer

piggy bank robbery

Enforcement Cut Global Banking Trojans 53 Percent

Coordinated global enforcement efforts reduced the number of financial Trojans by more than half -- 53 percent -- in 2014, according to a new report from Symantec, and phishing email rates fell 74 percent.

security log monitoring

How Better Log Monitoring Can Prevent Data Breaches

Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes?

TrueCrypt audit back on track after silence and uncertainty

Phase two of the project will begin shortly and will be done by a professional team of consultants

Jeb Bush's email dump puts constituents' personal data online

The emails posted on a Bush website included personal data such as Social Security numbers

Four technologies that betrayed Silk Road's anonymity

Even technologies designed to preserve privacy can reveal identities when not used thoughtfully

CryptoWall ransomware variant has new defenses

Cisco found that the latest version of the malware terminates itself if it runs in a virtual machine

securitytopstories

10 Top Security Stories of 2014

From data breaches and cyberthreats to uncertainty around mobile, cloud and the Internet of Things, these are the security stories that dominated 2014.

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a researcher said

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

Microsoft Patch Tuesday addresses Exchange and Explorer flaws

Microsoft issued 7 security patches for the month

Bitdefender security appliance for home networks seeks to replace end-point antivirus

Bitdefender BOX can replace or run alongside a home router to scan all network traffic for security threats

Activists release Detekt tool that finds surveillance malware

The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists

USB Armory is the Swiss army knife of security devices

A USB-stick computer built around a processor with strong security capabilities

Load More
You Might Also Like