Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
aiden
14 hours ago

The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and...

aiden
1 day ago

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

4 Answers |
owen
5 days ago

How can I remove all the metadata from Excel files before sharing them with another company?

2 Answers |
bralphye
5 days ago

Does Samsung’s proprietary security on its Android devices add anything significant other than a catchy name?

1 Answer |
dvarian
5 days ago

I like to use the feature in Chrome that allows me to save all my passwords, but how can I make sure that no one that has access to my computer can access...

1 Answer |
hughye
2 weeks ago

China is claiming that the iPhone poses a threat to the country’s national security, and there is talk about banning iPhone sales completely. China is not...

2 Answers |
PaxProSe
2 weeks ago

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure...

2 Answers |
tswayne
2 weeks ago

Avast released a report saying that they were able to recover data, including rather compromising personal photos, from used Android devices that had been “...

LolaBelle
3 weeks ago

I know that Microsoft is a big company with lots of capabilities, but how did they take down all of No-IP.com’s domains? From what I’ve read, that wasn’t...

Tags: malware, Microsoft, no-IP |
2 Answers |
blackdog
3 weeks ago

I’m looking for antivirus software for Windows 8 that doesn’t have a significant impact on system performance. Any suggestions?

The secure mobile vendor wants to be more secure.BlackBerry plans to buy a German vendor specializing in voice encryption.
The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
Today's hotels are unfortunately vulnerable to types of attempted fraud. Here's how to keep data safe when you travel.
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+