Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

amazon gift cards

httpseverywhere

Three privacy tools that block your Internet provider from tracking you

The government may soon allow your ISP to sell your browsing data. Here's how to fight back.

broken key

To punish Symantec, Google may distrust a third of the web's SSL certificates

Google plans to remove the extended validation (EV) status of any such certificates issued by Symantec and to force the company to replace all of its customers' certificates.

icloud

Leaked iCloud credentials obtained from third parties, Apple says

The iCloud credentials that the Turkish Crime Family hacker group claims to have weren't obtained through a breach of the Apple's services.

james comey fbi

FBI director floats international framework on access to encrypted data

The FBI director James Comey is suggesting an international approach to solving the encryption debate. He proposes that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

esmond kane

Blockchain can help secure medical devices, improve patient privacy

If implemented properly, blockchain can help secure medical devices and improve patient privacy, but the key is proper implementation, according to a top security pro at Partners Healthcare.

bitcoins

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.

thunderbolt ethernet adapter

Newly leaked documents show low-level CIA Mac and iPhone hacks

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

FCC building in Washington

Senate votes to kill FCC's broadband privacy rules

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without permission.

NSA headquarters

Snowden's ex-boss offers tips on stopping insider threats

Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency.

Brad Antoniewicz cisco

Cisco security researcher: Ransomware crowd big on customer service

Cisco security research breaks down the anatomy of a cyberattack throughout the exploit kit infection chain, all the way to ransomware attacks and investigation into such breaches, at SecureWorld Boston event

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Anti-fraud measures by the Internal Revenue Service (IRS) and state agencies over the past two years have made tax refund scams harder for cyber criminals to pull off even as attacks targeting taxpayer information continue unabated.

code programming software bugs cybersecurity

LastPass fixes serious password leak vulnerabilities

Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.

White House (public domain)

Experts: US needs a federal CISO

Last week, the Trump administration announced the appointment of a White House cybersecurity coordinator. That's a good first step, security experts say, but the government also needs to have a federal CISO

london terror attack

Surviving the attack

Recent global events have once again shown that our world is becoming more violent, with deaths from conflict and terror attacks on the rise. However, public discourse largely neglects the concept of personal situational awareness and...

1 intro insider threat

How to stop insider threats

There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information.

05 passwords

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs.

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

00 7spies title

How worried should your organization be about cyber espionage?

Criminal gangs are turning over millions from breaching businesses - but the organisations with the biggest budgets are the intelligence agencies of nation states. How seriously should your organisation take cyber espionage?...

Load More