Topic: Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

Ask a question

Join Now or Sign In to ask a question.
aiden
1 day ago

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

5 Answers |
owen
5 days ago

How can I remove all the metadata from Excel files before sharing them with another company?

1 Answer |
hughye
1 week ago

China is claiming that the iPhone poses a threat to the country’s national security, and there is talk about banning iPhone sales completely. China is not...

2 Answers |
PaxProSe
1 week ago

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure...

2 Answers |
tswayne
1 week ago

Avast released a report saying that they were able to recover data, including rather compromising personal photos, from used Android devices that had been “...

LolaBelle
2 weeks ago

I know that Microsoft is a big company with lots of capabilities, but how did they take down all of No-IP.com’s domains? From what I’ve read, that wasn’t...

Tags: malware, Microsoft, no-IP |
2 Answers |
blackdog
2 weeks ago

I’m looking for antivirus software for Windows 8 that doesn’t have a significant impact on system performance. Any suggestions?

LolaBelle
2 weeks ago

Time flies, but it was only about 10 weeks ago that news of the Heartbleed security bug broke and created a few days of mostly justified panic. I haven’t...

Tags: Heartbleed |
2 Answers |
owen
3 weeks ago

The person who set the password on our router left the company and now no one can find the password. Is there a way to recover the...

4 Answers |
TravisT
3 weeks ago

I know how to clean data from an old hard drive, including to the point of physical destruction, but what about a SSD? What steps need to be taken to ensure...

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.
Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.
Email encryption startup Virtru has launched a version of its service for businesses using Google Apps, a market segment that the company thinks is showing increased interest in secure communications.
Researchers have concluded that those billions of connected devices could help save lives in the event of disaster, even one that knocks out the Internet
Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets.
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month.
Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.
It's not just dissidents looking for anonymous email, but everyday people who'd rather not reveal their true identity.
In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.
This reduces time-to-mitigation for numerous types of events.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

White Papers & Webcasts

See more White Papers | Webcasts

randomness