firehose
piggy bank robbery

Time to FREAK out? How to tell if you're vulnerable

Not everyone is vulnerable to the FREAK flaw researchers disclosed on Tuesday. Here's how to tell if you are.

crime scene digital

The cybercrime economy personified

The cybercrime economy is entrenched in digital fox holes and hoodlum hideouts the world over. It’s not going away. Your best bet is to be the hardest target on the battlefield.

paranoid

The paranoid CISO

Just because there is no noise on our security sensors does not mean we are not under attack. Enter the ever-vigilant and paranoid CISO.

reboot cloud security

What happens inside Amazon when there’s a Xen vulnerability

When a Xen vulnerability is found, Amazon security engineers scramble to respond.

President Obama at the State of the Union 2015

Privacy advocates find Obama proposal lacking

The proposed consumer privacy bill of rights allows companies to limit consumer control, critics say

edward snowden video

Snowden willing to face trial in US, if it's fair

The NSA leaker's lawyers are negotiating a return to the US to face charges

amazon gift cards

Android users spammed with fake Amazon gift card offers

Text messages promising free gift cards deliver only spam instead

devs freaking

FREAK is another serious flaw in the web's encryption

US export restrictions on encryption technology from the 1990s have come back to haunt the modern Web

godaddy nascar

Drive-by attack relies on hacked GoDaddy accounts

The Angler exploit kit is using subdomains created by cybercriminals on real domain name accounts as part of its infrastructure

security guard

Apple, like Google, to hire full-time security guards in Silicon Valley

Tech companies are under pressure to improve working conditions of workers like drivers and security guards

surveillance

China says new cybersurveillance proposal follows US security practices

The U.S. argues China's anti-terrorism law would require foreign tech businesses to hand over sensitive data to the government

samsung galaxy s6

How will Samsung Pay compare to Apple Pay?

Besides its catchy name, of course!

00 title

Flappy apps give users the angry bird

Beware buying apps as they may not be what they seem. Criminals often crowd stores with malware-laden fake versions. Here are several examples.

app malware

Attackers clone malware-laden copies of popular apps

Don’t get angry when cyber crooks give your enterprise the bird, get even.

computer hacking hacker thief white collar crime stealing keyboard hand shadow 000001325773

Attackers target subdomains of GoDaddy customers

Attackers have set up around 10,000 malicious subdomains on accounts belonging to GoDaddy customers, according to a new report. The technique, called domain shadowing, first appeared in 2011 but has dramatically grown in popularity in...

00 7spies title

7 of the most famous spies

Real world spies are continually at work, grabbing government top secrets and business trade secrets. Here are seven of the most famous / infamous spies.

enterprise security

How to connect to enterprise Wi-Fi security on Android devices

Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know.

google map location pin

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

Load More