Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

home security
internet of things

05 malware

Network analysis can find malware before it strikes

Malware indicators show up on a network weeks before malicious software is uncovered. It's important, then, that network analysis be conducted regularly.

tablet with skull and crossbones cybersecurity

Gravityscan, keeping WordPress sites safe

If you want to keep your WordPress site free from hackers, you need Gravityscan to find the vulnerabilities

mobile tablet statistics analytics stocks

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

subtitle hero

Hackers can use malicious subtitles to remotely take control of your device

Researchers warned that subtitles can be hacked and made malicious, allowing attackers to take complete control of devices running vulnerable versions of Kodi, Popcorn Time and VLC.

blurry network server room

PureSec picks up investment because serverless is exciting

There’s plenty of industry buzz around serverless computing, and PureSec is jumping on that gravy train.

wifi iot

Cisco: Secure IoT networks, not the devices

Cisco’s IoT Threat combines network segmentation rule creator product TrustSec, network behavior analytics platform Stealthwatch and device visibility offering named Cisco Identity Service Engine, all used in conjunction to secure IoT...

binoculars search look magnify

Do you know where your data is?

Third-party risk is very real – your company’s reputation may be in your vendor’s hands.

encryption

Educating the public about security – are we doing it all wrong?

If consumers don’t truly understand the measures that businesses are putting in place to protect their data, they won’t be aware of how secure their data is. There are five key steps that any business must undertake when protecting...

boardroom presentation

How security executives can feel comfortable in the boardroom and server room

Successful CSOs and CISOs need to clearly articulate the importance of security to non-technical executives, show how security can help a company achieve its business goals and balance security with innovation.

cybersecurity

How quantum computing increases cybersecurity risks

Quantum computers are expected to arrive within nine years, and organizations better have quantum-safe security if they want to keep their data safe.

galaxy s8 iris2

Hackers trick iris scanner to unlock Samsung Galaxy S8

Chaos Computer Club easily broke Samsung's Galaxy S8 iris recognition authentication. Same hack could unlock the Samsung Pay mobile wallet.

12 ransomware

WannaCry was a Windows 7 phenomenon

The weakness of Windows 7’s Defender was partly to blame for the WannaCry ransomware outbreak.

netgear nighthawk x10 ad7200 home entertainment

Netgear NightHawk R7000 routers now collect user data

A firmware update to Netgear NighHawk R7000 routers allows the routers to collect IP, MAC address and info about connected devices. Here's how to disable it.

Splunk's position on SOAPA – Part 1

Splunk's senior vice president of security markets, Haiyan Song, talks about security technology integration, Splunk’s strategy and customer benefits.

intro

New products of the week 5.22.17

Network World's final edition of its long-running highlight of the latest and greatest products in the tech sector.

frustrated computer user

EternalRocks network worm uses 7 NSA hacking tools

At least one person is leveraging seven Shadow Brokers-leaked NSA hacking tools for a new EternalRocks network worm.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

Arlo Go Netgear

Are VMs more secure than containers?

In theory, virtual machines (VMs) are more secure than containers. In practice, they probably are. It depends on how the VMs are implemented.

Load More