Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

tablet with skull and crossbones cybersecurity
mobile tablet statistics analytics stocks

subtitle hero

Hackers can use malicious subtitles to remotely take control of your device

Researchers warned that subtitles can be hacked and made malicious, allowing attackers to take complete control of devices running vulnerable versions of Kodi, Popcorn Time and VLC.

blurry network server room

PureSec picks up investment because serverless is exciting

There’s plenty of industry buzz around serverless computing, and PureSec is jumping on that gravy train.

wifi iot

Cisco: Secure IoT networks, not the devices

Cisco’s IoT Threat combines network segmentation rule creator product TrustSec, network behavior analytics platform Stealthwatch and device visibility offering named Cisco Identity Service Engine, all used in conjunction to secure IoT...

binoculars search look magnify

Do you know where your data is?

Third-party risk is very real – your company’s reputation may be in your vendor’s hands.

encryption

Educating the public about security – are we doing it all wrong?

If consumers don’t truly understand the measures that businesses are putting in place to protect their data, they won’t be aware of how secure their data is. There are five key steps that any business must undertake when protecting...

boardroom presentation

How security executives can feel comfortable in the boardroom and server room

Successful CSOs and CISOs need to clearly articulate the importance of security to non-technical executives, show how security can help a company achieve its business goals and balance security with innovation.

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

galaxy s8 iris2

Hackers trick iris scanner to unlock Samsung Galaxy S8

Chaos Computer Club easily broke Samsung's Galaxy S8 iris recognition authentication. Same hack could unlock the Samsung Pay mobile wallet.

12 ransomware

WannaCry was a Windows 7 phenomenon

The weakness of Windows 7’s Defender was partly to blame for the WannaCry ransomware outbreak.

netgear nighthawk x10 ad7200 home entertainment

Netgear NightHawk R7000 routers now collect user data

A firmware update to Netgear NighHawk R7000 routers allows the routers to collect IP, MAC address and info about connected devices. Here's how to disable it.

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.

intro

New products of the week 5.22.17

Network World's final edition of its long-running highlight of the latest and greatest products in the tech sector.

frustrated computer user

EternalRocks network worm uses 7 NSA hacking tools

At least one person is leveraging seven Shadow Brokers-leaked NSA hacking tools for a new EternalRocks network worm.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

Arlo Go Netgear

Are VMs more secure than containers?

In theory, virtual machines (VMs) are more secure than containers. In practice, they probably are. It depends on how the VMs are implemented.

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

pc antivirus

Yes, you still need endpoint malware protection

While operating systems and apps are more secure, the need for endpoint security remains.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Load More