Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
jack12
5 hours ago

Maybe I have my tinfoil hat on too tight, but I don’t like the idea of anyone being able to “listen” in on my private conversations. On the other hand, in...

1 Answer |
aiden
2 days ago

The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...

aiden
4 days ago

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

4 Answers |
owen
1 week ago

How can I remove all the metadata from Excel files before sharing them with another company?

2 Answers |
bralphye
1 week ago

Does Samsung’s proprietary security on its Android devices add anything significant other than a catchy name?

1 Answer |
dvarian
1 week ago

I like to use the feature in Chrome that allows me to save all my passwords, but how can I make sure that no one that has access to my computer can access...

1 Answer |
hughye
2 weeks ago

China is claiming that the iPhone poses a threat to the country’s national security, and there is talk about banning iPhone sales completely. China is not...

2 Answers |
PaxProSe
2 weeks ago

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure...

2 Answers |
tswayne
2 weeks ago

Avast released a report saying that they were able to recover data, including rather compromising personal photos, from used Android devices that had been “...

LolaBelle
3 weeks ago

I know that Microsoft is a big company with lots of capabilities, but how did they take down all of No-IP.com’s domains? From what I’ve read, that wasn’t...

Tags: malware, Microsoft, no-IP |
2 Answers |
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
randomness