Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
cchecca
7 hours ago

All of the recent security issues in the news makes me curious - How much are my personal details and information worth in real dollars? Is there an actual...

1 Answer |
delia25
1 day ago

I understand that using unsecured public WiFi is a security risk, and if I’m not using a VPN, someone can “eavesdrop” on my activity. What I don’t know is...

2 Answers |
ernard
1 day ago

I understand zero day to mean that there is a serious security issue, but I don’t know what it actually means. Where does the term “zero day” come from?

pwarren
2 days ago

Like everyone else, I’ve heard a lot about OpenSSL since the Heartbleed security flaw was discovered. I understand that it is intended to encrypt website...

Tags: Heartbleed, OpenSSL |
2 Answers |
rtrembley
2 days ago

Whenever I enter my password, I get an error message that says “This Apple ID has been disabled for security reasons.” I think my youngest daughter tried to...

Tags: apple, Apple ID, security |
1 Answer |
rtrembley
2 days ago

Whenever I enter my password, I get an error message that says “This Apple ID has been disabled for security reasons.” I think my youngest daughter tried to...

Tags: apple, Apple ID, security |
1 Answer |
Jack McCarron
3 days ago

To print from google cloud print to a standard (non-cloud) printer the printer must be connected to a computer with a wifi connection that runs google...

pwarren
3 days ago

Once website have fixed the vulnerability, will there be any ongoing problems as a result of the Heartbleed bug?

3 Answers |
dayzsunny
1 week ago

What can be done to minimize the risk of the Heartbleed bug while online? How significant is the security risk to the average internet user?

2 Answers |
Number6
1 week ago
TRUSTED VOICE

I think we will have all of the PCs in our office upgraded from Windows XP by the time support ends on May 13, but then again, maybe not. What should be...

Tags: security, Windows XP |
2 Answers |
National security may be at stake as private businesses try to manage a growing number of cyberthreats, but IT professionals shouldn't have to bear that burden alone.
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and functionality that you're not familiar with. Don't sweat it: We're here to help. We've collected some of our favorite and most useful tips and compiled them here, just for you.
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation.
For almost an entire year, malicious attackers may have been harvesting customer information including credit card data.
During a week in which everyone seemed to be searching for answers amid revelations of the Heartbleed bug, several universities and their partners announced new efforts to explore IT security advances.
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.
Reduce your exposure to spying eyes with sandboxing, disk encryption and more.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness