Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
ncharles
10 hours ago

How can people prevent their private photos from being accessed by hackers?

ttopp
11 hours ago

Not to delve in to the files that were stolen, but I assume most people have heard about the multiple celebrities’ iCloud account that have been breached...

hughye
4 days ago

I have NFC capabilities in my phone, but I’ve never had a use for it so it’s always turned off. However, there are some efforts to use NFC in smartphone for...

Tags: mobile payments, NFC |
1 Answer |
rcook12
1 week ago

What is SED encryption? I saw it in a hard drive description, but I’ve never heard of it before.

2 Answers |
SilverHawk
1 week ago

We have an employee that we strongly suspect of some unethical behavior, without going into further detail. She has a work issued Android phone (a Galaxy S4...

MrsMith
1 week ago

My daughter copied a lot of music and photos from a flash drive onto our family PC a couple of days ago, and it has been running slowly ever since. Even...

catamount
2 weeks ago

I used to use FreeFileSync a few years ago and liked it, so I recently installed it on a Windows laptop. Unfortunately, they decided to add conduit malware...

3 Answers |
ernard
2 weeks ago

The San Jose Mercury News reported that Google will start adding whether a website uses HTTPS to the factors that determine its search ranking. Will this be...

Tags: google, HTTPS, SEO |
4 Answers |
mandril
2 weeks ago

I heard BGP hijacks referred to as a method of mining bitcoins. What is a BJP highjack?

dblacharski
2 weeks ago

Yes, it's true that everyone should know better, and should be backing up data to an off-site facility on a regular basis. But, in...

11 Answers |
Mozilla has added a defense in its latest version of Firefox that would help prevent hackers from intercepting data intended for major online services.
Traffic is chaotic enough in major cities, but imagine how much worse it would be if a criminal hacker got control of the traffic lights.
In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.
Apple has issued a statement regarding the hacking of dozens of celebrities' cellphones that exploded over the weekend.
AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.
Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards.
Better than 2013 but still not good enough.
That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
It's not ready for prime time yet, but the early builds of a new privacy-focused chat client are promising.
If photos were stolen during a cloud hack, enterprises may be more skittish over cloud use.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness