microsoft logo
e res id card


Mobile security Q&A: Securing the mobile minimum viable app

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?


PCWorld Show Episode 3

We talk Surface Pro, Intel Skylake overclocking, and whether it's OK for a computer to be considered a "driver."

energy usage

Public-private cyber threat intelligence sharing necessary in electricity industry

Cybersecurity professionals are hungry for a strategic advantage to battle new denial of service attacks and unauthorized access to systems. The electricity industry has started to focus its efforts on combating the issue head-on...

20151027 vmware sign

Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass

The Pwn2Own hacking contest in March will award security researchers for exploiting Google Chrome, Microsoft Edge, Apple Safari, Flash Player and, for the first time, VMware Workstation.

connected cars ts

White-hat hackers key to securing connected cars

Federal regulator warns of security and privacy risks in connected cars, calling on manufacturers to partner with white-hat hackers to seek out flaws and vulnerabilities.

Suzan DelBene

ENCRYPT Act co-sponsor learned tech ropes at Microsoft

Rep. Suzan DelBene, one of four congressional sponsors of the ENCRYPT Act, which would preempt state and local laws banning encryption on smartphones, cut her teeth in mobile communications for Microsoft.

Android Security Audit

7 Android tools that can help your personal security

Forget security suites: These seven sensible tools are all you really need on your Android phone to stay safe.

electric locomotive ukraine

Hackers of two Ukrainian utilities probably hit mining and railroad targets, too

The attackers who crippled Ukrainian power operators in December probably committed attacks shortly before against a mining company and a railway operator, Trend Micro said Thursday.


Hardcore Hardware: The Brompton S6L is the ultimate folding bicycle

If you're looking for an edge in the urban rat race, this tiny British bicycle is it.

heart mousetrap

Risky business? Online dating fraud dips during Valentine's Day

Good news, online daters, according to research conducted by device intelligence and fraud prevention company iovation, fraud on online dating sites is lower leading up to Valentine's Day.

Internet Explorer

It's official: Older versions of IE are now at risk

Microsoft this week made good on a 2014 promise and withheld security updates from users of older versions of Internet Explorer.


Driverless Cars: The existential threat

Today's driverless car is tomorrow's "floaty chair," and that's bad news for humankind.

rubiks globe

Study finds that anti-crypto laws won't work on an international stage

If the U.S. government restricts the export of encryption technology, or mandates back doors in U.S.-made encryption products, then both legitimate customers as well as criminals and terrorists can easily switch to encryption products...

20151005 cisco headquarters sign

Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking

Cisco Systems patched a critical vulnerability that could allow remote attackers to take over Cisco Adaptive Security Appliance (ASA) firewalls configured as virtual private network servers by simply sending malformed network packets...


How to ensure PCI DSS compliance when dealing with message queues

To queue or not to queue, that is the PCI question – part 2 by David Mundhenk and Ben Rothke

voting new hampshire

Voter targeting becomes voter surveillance

Political campaigns have discovered what marketers of all products know – the better you know your customer, the better you can target the advertising and increase the chances of a sale. But privacy advocates say voter surveillance is...

https encrypted

Which security products do enterprises expect too much from?

Attackers will thank you for enabling them to bypass firewalls and VPNs by allowing infected laptops to send hostile packets through both into your network.

bad store

Android root malware widespread in third-party app stores

Four third-party app stores for Android have apps with a malicious component that seeks root access to the device, according to Trend Micro.

Load More