Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

orange is the new black cast
nsa aerial

keyboard user security

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic and stealing sensitive information.

HTTP Chrome

Google's Chrome will soon start warning you more about HTTP pages

A Google effort to push websites to implement encryption is expanding. Starting in October, the company will flag even more HTTP connections as insecure in its Chrome browser.

rtx2fn4k

TSA: “As you can imagine, live anti-tank rounds are strictly prohibited altogether.”

“As you can imagine, live anti-tank rounds are strictly prohibited altogether.”

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

For online businesses, fraud is a serious and growing problem that rule-based systems can no longer address. Machine learning is instrumental in detecting and stopping fraud in real-time, without causing an impact to the user...

security code big data cyberespionage DDoS

Network management vulnerability exposes cable modems to hacking

Hundreds of thousands of internet gateway devices from around the world, primarily cable modems, are vulnerable to hacking because of a serious weakness in their implementation of the Simple Network Management Protocol.

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

20160224 stock mwc internet of things iot sign

Cloudflare wants to secure IoT connections to the internet

Web optimization and security firm Cloudflare launched a service that could allow IoT manufacturers to protect devices from attacks and deploy patches much quicker.

multifactor authentication

Advances in multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

security tools intro slide

9 essential tools for the security-conscious mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

ransomware

Failure to communicate helps ransomware prosper

Ransomware is rampant. And a SOURCE Boston 2017 panel agreed one of the major reasons is a lack of communication: It is under-reported, there is not enough information sharing about it, and not enough public awareness.

160302 pentagon

U.S. military wants white-hat hackers to target its cyber security systems

The U.S. Air Force is seeking vetted hackers to probe its public Web sites while a top Pentagon official is considering a similar program to test sensor networks used for HVAC and other physical systems.

Enterprise security technology consolidation

Large organizations are consolidating the number of security vendors they do business with and buying products built for integration.

top attacks

IBM: Financial services industry bombarded by malware, security threats

IBM X Force says financial services are targeted 65% more by cyber-attacks than the average organization

botnet bots

Next-gen IoT botnet Hajime nearly 300K strong

The Hajime botnet is nearly 300,000 strong, making it a latent threat nearly as powerful as the notorious Mirai botnet that devastated some high-profile websites last fall, leading some to think the internet had been broken.

20151028 verizon logo innovation center 100624637 orig

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

shield protection

Foiled! 15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

1 measure roi

10 ways to achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

Load More