Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

dangerous cyber celebrities 2016 intro
strata apache spot hadoop

open source 2

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

As Bryan Lunduke embarks on the quest to make his digital life as private and secure as possible, he’s decided open source software is the only way.

evil clown

Creepy clowns cause sheriff to consult with FBI and Homeland Security

There's no end in sight for creepy clown reports thanks to social media hysteria. Dress like a clown, and you might be arrested.

rtx2bxid

Elon Musk’s next great adventure: Colonizing Mars

The details of the SpaceX Interplanetary Transport System mission are daunting -- it requires a massive booster system and spacecraft (think a ship north of 416ft tall and 55ft in diameter – NASA’s Apollo mission rocket, Saturn 5 was...

marten mickos

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Marten Mickos is crowdsourcing security with a growing army of ethical hackers who can help your company if you’re ready to adopt a new security mindset.

eye on computer monitor showing privacy security or breach

Down the rabbit hole, part 1: Making my life private and secure

Bryan Lunduke embarks on a new ‘experiment in computering’: to make life as private and secure as possible while remaining digitally connected.

yahoo mail

Six senators demand more details about the Yahoo data breach

Six U.S. senators called Yahoo's belated discovery of a massive data breach "unacceptable," and they're demanding that the company provide more details.

nagini ransomware named after voldemorts pet snake

Ransomware roundup: Targeting servers and government, honoring Donald Trump and Voldemort

One ransomware targets servers, one goes after local and state governments and K-12 schools, and others honor Donald Trump and Voldemort.

gottfried leibbrandt ceo swift sibos 2016

Swift CEO reveals three more failed attacks on banking network

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive DDoS attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

marblehead neck house by victor cruz

Always be prepared: Monitor, analyze and test your security

Critical Security Controls: Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20.

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

Yahoo has blamed its massive data breach on a "state-sponsored actor". But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence.

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

sofacy 1

New Mac Trojan uses the Russian space program as a front

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry.

A shout out to Akamai for candor in IoT botnet attack

Akamai deserves credit for the way it disclosed why it stopped protecting the Krebs on Security Web site last week after defending it for three days from the largest botnet it had ever encountered.

nuclear bomb test bikini atoll mushroom cloud explosion detonate

The IoT is uranium

IoT devices are like uranium—as dangerous as post-Soviet era nuclear weapons.

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

Load More