Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

ransomware hardware security embedded circuit board integrated controller
iot trackers

schneider electric modicon m340 plc

Schneider Electric PLC simulator flaw exposes workstations to hacking

The software used to program and deploy code to various Schneider Electric industrial controllers has a weakness that could allow hackers to remotely take over engineering workstations.


REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

cybersecurity skills and talent shortage

Cybersecurity staffing issues may be putting you at risk

Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs.

Automated cars are raising concerns about privacy and security

US transport agency guidance on vehicle cybersecurity irks lawmakers

Guidance from the National Highway Traffic Safety Administration for improving motor vehicle cybersecurity has attracted criticism from lawmakers who said that mandatory security standards were required.

Lyft App

Lyft customers face potential hack from recycled phone numbers

Giving up an old cell phone number for a new one may seem harmless. But for Lyft customers, it can potentially expose their accounts to complete strangers.


White House: Small satellites bring “Moore’s Law” into space

Looking to bolster that notion, the White House recently revealed a number of program that it says will help drive the use of smallsats even further. The White House Office of Science and Technology Policy (OSTP) announced what it...


Answers to ‘Is the internet broken?’ and other Dyn DDoS questions

A Q&A on what caused the Dyn DDoS attacks and what to do to protect yourself and your network.

ransomware hardware security embedded circuit board integrated controller

Physical RAM attack can root Android and possibly other devices

Researchers have devised a new way to fully compromise Android devices without exploiting any software vulnerability and instead taking advantage of a physical design weakness in RAM chips.


Chinese firm recalls camera products linked to massive DDOS attack

A Chinese electronics component maker is recalling 4.3 million internet-connected camera products from the U.S. market amid claims they may have played a role in Friday's massive internet disruption.


Media fails to tell consumers about device flaws in Friday’s internet outage

When reporting on Friday’s DDoS attack, the national media should have warned consumers not to install internet-connected devices that have a 4-year-old flaw.

best messenger apps for protecting privacy

SnapChat, Skype among worst messaging apps for not respecting users’ right to privacy

Amnesty International ranked 11 tech companies and their messaging apps. Facebook had the best privacy, while SnapChat and Skype were among the worst.

102416blog southwest primary

Does Southwest’s new ‘password’ commercial need to get away?

If you watched any football yesterday, chances are you saw the latest in Southwest Airlines’ “Wanna get away?” commercial series, this one featuring a military general and his comical willingness to surrender his network access...

pulling companies apart chain broken

Cybersecurity, business and IT relationships

Working relationships between cybersecurity, business and IT groups are strained and fraught with challenges.

election poll

Bots may be trumping online polls

Poll results are supposed to be driven by opinions, but marketers, politicians and others know opinions can be driven by polls. Hence the rising use of bots to skew perceptions in favor of a product, a celebrity or, at this time of...


Better safe than sorry: 5 apps for encrypting and shredding files

If you want to protect sensitive data -- especially if you’re sending it via email or via an online service -- one of these five encryption programs can help.

cellular mast tower antenna

French surveillance law is unconstitutional after all, highest court says

The French Constitutional Council has taken another look at a new security law it waved through in July 2015, and found it wanting.


New products of the week 10.24.16

Our roundup of intriguing new products from companies such as Barracuda and Watchguard.

assange on balcony

WikiLeaks says it doesn’t collaborate with states

WikiLeaks claims to have many thousands of sources but does not collaborate with states in the publication of documents, its editorial board said Sunday.

Load More