Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands


meltdown spectre

New Spectre derivative bug haunts Intel processors

Researchers have discovered how to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information. A fix is coming March 16.

cryptocitizen healthcare

What to understand about health care IoT and its security

How the Internet of Things is disrupting the health care market and how we can take steps to secure medical devices.

salted hash thumbnail final

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

ddos attack

Memcached servers can be hijacked for massive DDoS attacks

Any Memcached server not behind a firewall is at risk of being hit by a DDoS attack.

salted hash thumbnail final

GDPR deadline looms: The price and penalties | Salted Hash Ep 20

With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.

bad security habits

Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products

NSS Labs tests data center intrusion prevention systems (DCIPS) from Fortinet, Juniper Networks, McAfee and Trend Micro.

tools and a tablet forming the shape of a house/building

Is the IoT backlash finally here?

After years of worry, the long-anticipated backlash to the changes wrought by the Internet of Things may finally be arriving. That could be a good thing.

salted hash thumbnail final

Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

How to test wireless M2M IoT devices for network readiness

Machine-to-machine (M2M) communication is a significant and growing subset of the larger Internet of Things (IoT) movement, so you have to ask, “Is my network ready for machine-to-machine (M2M) devices?” IoT can include vehicles...

salted hash thumbnail final

Managing open-source mobile security and privacy for activists worldwide | Salted Hash Ep 18

Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...

internet things iot

Tips for securing IoT on your network

Judging by all the media attention that The Internet of Things (or IoT) gets these days, you would think that the world was firmly in the grip of a physical and digital transformation. The truth, though, is that we all are still...

Malware virus

Researchers find malware samples that exploit Meltdown and Spectre

As of Feb. 1, antivirus testing firm AV-TEST had found 139 malware samples that exploit Meltdown and Spectre. Most are not very functional, but that could change.


Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.


AMD plans silicon fix for Spectre vulnerability

AMD intends to have a silicon fix for the variant 2 of the Spectre exploit, the only one of the Meltdown and Spectre exploits it’s vulnerable to, by 2019.


Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now.

open source alternatives routing firewall 1

How to eliminate the default route for greater security

If portions of enterprise data-center networks have no need to communicate directly with the internet, then why do we configure routers so every system on the network winds up with internet access by default? Part of the reason is...

bose soundsport free workout

IoT and the law of unintended consequences

Strava’s fitness app usage heatmap accidentally reveals military deployments — and it won’t be the last time good IoT intentions lead to unanticipated problems.

bad security habits

What is microsegmentation? How getting granular improves network security

Microsegmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually.

Load More