The loss of net neutrality: Say goodbye to a free and open internet

The loss of net neutrality: Say goodbye to a free and open internet

The effort to restore net neutrality advanced after the U.S. Senate voted to reinstate the rules. The motion still has a battle ahead of it. If it fails, you can expect these long-lasting problems to surface.

Intel sold you out

Intel sold you out

A vulnerability in Intel’s AMT could leave you open to attack

Net neutrality is net new revenue

Net neutrality is net new revenue

Rolling back net neutrality rules will spawn record shareholder returns and telco empires—and destroy the original concept of the internet.

Security certificates gone wrong

Security certificates gone wrong

Some websites, including one secured by the U.S. Department of Homeland Security, fail in their use of security certificates.

Virtual assistants hear everything, so watch what you say. I’m not kidding

Virtual assistants hear everything, so watch what you say. I’m not kidding

Virtual assistants such as Google Home and Amazon Echo lack security guards, raising questions about safety and privacy.

The IoT of bricks: Someone is bricking insecure IoT devices

The IoT of bricks: Someone is bricking insecure IoT devices

BrickerBot takes IoT security into its own hands. It finds vulnerable IoT devices and disables them, creating potentially dangerous situations.

10 practical privacy tips for the post-privacy internet

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy.

The insecurities list: 10 ways to improve cybersecurity

The insecurities list: 10 ways to improve cybersecurity

Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users.

Pwn2Own 2017: Your stuff as mincemeat

Pwn2Own 2017: Your stuff as mincemeat

Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof.

After the WikiLeaks dump: Do nothing

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices.

Checklist for choosing a small cloud host or ISP

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Mobile World Congress 2017: Mobility monsters

Mobile World Congress 2017: Mobility monsters

GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination.

The $475 S key

The $475 S key

Without Apple Care, a broken S key on a MacBook Air turns into an outrageous $475 repair.

Harbinger of The Great Internet Wall arrives

Harbinger of The Great Internet Wall arrives

President Trump’s executive order on immigration puts non-U.S. citizens’ data in jeopardy.

The latest database attacks: Tips of the icebergs

The latest database attacks: Tips of the icebergs

MongoDB, ElasticSearch and Hadoop have been hit by ransomware. This is just the beginning of such attacks.

Windows 10 peeping: Microsoft fails to understand the uproar

Windows 10 peeping: Microsoft fails to understand the uproar

With each new Windows update malady, Microsoft loses the confidence of users who might otherwise find value in the product.

Rated insecurity: Faux Cat 6 cable sold on Amazon

Rated insecurity: Faux Cat 6 cable sold on Amazon

Some Amazon sellers offer Cat 5 and Cat 6 Ethernet cable for cheap, but it is insecure—isn’t UL- or TIA-approved and is at risk for starting a fire.

On being a 24/7 organization and the 2016 leap second

On being a 24/7 organization and the 2016 leap second

Providing 24/7 support 365 days a year isn’t a requirement, causing headaches when you need help most. On top of that, the 2016 leap second could complicate things.

Zen and the art of security

Zen and the art of security

Achieving security Zen is a long discipline of unlearning what you’ve learned and accepting countless paradoxes.

Looking to 2017: It’s not just enterprise security

Looking to 2017: It’s not just enterprise security

Things are bad for the security of everything and data privacy, and 2017 will be equally bad if not worse.

Load More