Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

8280621169 343f6eb32a k
eye idea surreal bizarre monitor spy

cybersecurity ts

Solution to JIT-ROP cyber attacks: Scramble code quickly

Shuffling software code around can stop hackers’ exploits. And better, faster versions of the scrambling are the future of computer defense, a research team says.

tokyo apple japan

Researchers find a way bypass the iOS activation lock

Two researchers claim to have found a way to bypass the activation lock feature in iOS that's supposed to prevent anyone from using an iPhone or iPad marked as lost by its owner.

Android statues

Remote management app exposes millions of Android users to hacking

Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks.

Trump cybersecurity dos and don’ts

President-elect Trump could make strong progress on cybersecurity while adhering to his campaign promises.

visa cards credit debit money

‘Distributed guessing’ attack lets hackers verify Visa card details

Add credit card fraud to the list of things that distributed processing can speed up.

privacy lock security public domain

How Windows 10 data collection trades privacy for security

Here's what data each telemetry level collects and the price you pay to send the least telemetry to Microsoft

internet security with lock

How we got our tattered IoT insecurity blanket

Security problems are pervasive on the Internet, and they are being made more acute because of the Internet of Things.

hacker, hack, hacking

Major cybercrime network Avalanche dismantled in global takedown

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years.

Best practices for lowering cyber insurance costs and cyber risk

If your cyber insurance vendors offer incentives or discounts for companies who meet high data security and protection standards, they will likely focus on these processes and controls

malware attack cyberespionage code hacker

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyber attack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data.

blame 174280704

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

werner vogels aws reinvent 2016

AWS tries to protect its customers from DDoS attacks with new service

Amazon Web Services is trying to help protect its customers with a new service aimed at mitigating DDoS impacts. It’s called Shield, and the entry-level tier is enabled by default for all web applications running on AWS, starting on...

globalinteraction3full

DARPA gamification plan to get deep-thinkers, game-changers to collaborate

The agency is proposing an online community known as Gamifying the Search for Strategic Surprise (GS3) that would “apply a unique combination of online game and social media technologies and techniques to engage a large number of...

security thinkstock

How to architect the network so IoT devices are secure

New and increased traffic patterns from the Internet of Things create security challenges.

fbi trump iphone

A year after terrorist attacks, phone privacy laws unchanged – but watch out for Trump

Although the perpetrators of the San Bernardino mass shooting were killed in a gun battle with law enforcement within hours of the attack, the FBI’s interest in one terrorist’s iPhone precipitated a public standoff with Apple that...

TopSpin Security deploys realistic deceptions to lure and trap attackers

Deception technology can be effective in detecting an attacker as soon as they begin making moves on the network.

pacemaker hacking kit

Implantable medical devices can be hacked to harm patients

It's possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work, researchers in Belgium and the U.K. have demonstrated.

stbasils cathedral moscow russia

Scholars, infosec experts call for action on Russian hacking

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and security experts are calling for federal action

Load More