Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

st jude pacemaker
chain security stock

Distil Networks uses device fingerprints to detect malicious web bots

Web applications are increasingly being subjected to automated threats such as click fraud, comment spam, content scraping, and more. Bot detection and mitigation can close these vulnerabilities.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

Firefox

Mozilla launches free website security scanning service

Mozilla has built an online scanner that can check if websites have the best security settings in place.

checkmate chess

Real-life examples test whether you are prepared for a cyberattack

Incident response is still largely a human response. Multiply an outdated response plan by the many human errors that can innocently occur during response and you have a recipe for potentially cataclysmic results in the threat event...

privacy shield microsoft

Privacy Shield data transfer agreement now shelters 200 companies

There are now 200 companies standing behind Privacy Shield, the framework agreement allowing businesses to process the personal information of European Union citizens on servers in the U.S.

dropbox logo sign

Dropbox prompts certain users to change their passwords

Dropbox is asking users who signed up before mid-2012 to change their passwords if they haven’t done so since then.

Legal law gavel hammer courts

U.S. convicts Russian hacker in credit card theft scheme

A U.S. federal court has convicted a Russian hacker of stealing and selling over 2 million credit card numbers.

ios 9.3

Apple patches iOS security flaws found in spyware targeting activist

To spy on a human rights activist, government hired hackers may have gone as far to use three previously unknown vulnerabilities in Apple’s iOS.

malware spyware

Apple patches iOS against potent zero-day spyware attack

Apple is issuing patches for three iOS zero-day vulnerabilities known as Trident that have been exploited for years by an Israel-based spyware vendor against a human rights activist, an investigative journalist and others.

mobile banking trends and fraud risks simility

Fraud follows mobile banking adoption

Fraud prevention in increasingly popular mobile banking apps is of paramount importance in maintaining the trust and safety of users.

hacker hacked security risk

So your company’s been hacked: How to handle the aftermath

Education and planning are key, cyber-security expert Tyler Cohen Wood says.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

voting sign united states

Hack the vote: How attackers could meddle in November’s elections

Infiltrating electronic voting machines isn't the only way hackers can interfere with an election. Other hacks can prevent voters from heading to the polls.

life preserver

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a...

cyber attack stock image

New collision attacks against triple-DES, Blowfish break HTTPS sessions

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

00 short timer

10 tips for retaining top IT talent

When it comes to employee retention, tech companies have some of the highest turnover rates of any industry. Retaining top IT talent is a struggle for many businesses, but there are several things you can do to increase the likelihood...

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology new...

s630 cab office parliament cc

Facebook, Google, Twitter lax on terrorists’ misuse of their sites, say UK MPs

A panel of U.K. lawmakers has described as “alarming” that social networking companies like Facebook, Twitter and Google's YouTube have teams of only a few hundred employees to monitor billions of accounts for extremist content.

Load More