Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Question

    Which instant messaging services offer end-to-end encryption?

    Posted July 31, 2014 - 11:35 pm

    Maybe I have my tinfoil hat on too tight, but I don’t like the idea of anyone being able to “listen” in on my private conversations. On the other hand, in light of the revelations that the CIA has been listening in on the US Senate, maybe I need to upgrade my hat to the deluxe model.
  • Question

    How does Android “Fake ID” vulnerability compromise security and what can be done to prevent it?

    Posted July 29, 2014 - 9:06 pm

    The latest Android vulnerability has been called Fake ID, and as I understand it fools the OS by pretending to be a different app. How does it do that, and what can I do to prevent it?
  • Question

    How to protect my passwords in Chrome browser?

    Posted July 24, 2014 - 2:52 am

    I like to use the feature in Chrome that allows me to save all my passwords, but how can I make sure that no one that has access to my computer can access them?
  • Question

    What does Samsung’s Knox add to Android security?

    Posted July 23, 2014 - 12:12 pm

    Does Samsung’s proprietary security on its Android devices add anything significant other than a catchy name?
  • Question

    How to remove metadata from Excel files?

    Posted July 17, 2014 - 4:57 am

    How can I remove all the metadata from Excel files before sharing them with another company?
  • Question

    How could the iPhone threaten China’s national security?

    Posted July 11, 2014 - 3:07 pm

    China is claiming that the iPhone poses a threat to the country’s national security, and there is talk about banning iPhone sales completely. China is not Apple’s largest market, with sales of about 3 million iPhones per quarter, but that’s still a significant amount of revenue that the company stands to lose.
  • Question

    How to ensure greatest amount of privacy when online?

    Posted July 9, 2014 - 11:58 am

    I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure privacy, or are there other steps that I should take?
  • Question

    How did Microsoft cause millions of domains to go down?

    Posted July 3, 2014 - 5:17 pm

    I know that Microsoft is a big company with lots of capabilities, but how did they take down all of’s domains? From what I’ve read, that wasn’t Microsoft’s intention, and they were trying to combat Windows targeting malware, which is an admirable goal.
  • Question

    Is Heartbleed still a security concern or has it been neutralized?

    Posted June 28, 2014 - 8:43 pm

    Time flies, but it was only about 10 weeks ago that news of the Heartbleed security bug broke and created a few days of mostly justified panic. I haven’t heard anything about it in a while now. Has the problem been completely resolved, or is Heartbleed still cause for concern?
  • Question

    Which antivirus software has the least impact on system performance?

    Posted June 28, 2014 - 6:01 am

    I’m looking for antivirus software for Windows 8 that doesn’t have a significant impact on system performance. Any suggestions?
  • Question

    How to erase your tracks and protect privacy in Windows 7?

    Posted June 24, 2014 - 4:34 pm

    Not that I have anything in particular to hide, but since the Snowden revelations about how widespread government surveillance and overreach has become, I would like to scrub my PC’s history on a regular basis - clear caches, erase trace files, delete logs, etc. What’s the easiest way to take care of this with Windows 7?
  • Question

    Will a kill switch deter smartphone theft?

    Posted June 21, 2014 - 11:07 pm

    It looks like all three of the major mobile universes - Apple, Microsoft, and Google - are going to have kill switches incorporated in their designs. Finally. Apple already rolled it out, to their credit, with iOS 7. How much of an impact on theft will this have?
  • Question

    How to permanently erase data on SSD?

    Posted June 20, 2014 - 3:01 pm

    I know how to clean data from an old hard drive, including to the point of physical destruction, but what about a SSD? What steps need to be taken to ensure that data is erased and not recoverable from a solid state drive (SSD)?
  • Question

    How to select employee monitoring software?

    Posted June 20, 2014 - 2:15 pm

    I’ve never used employee monitoring software, but we’ve added a few people to my business and I feel like it is something I should at least consider. What features are important to look for when choosing employee monitoring software?
  • Question

    How to create strong passwords I can actually remember?

    Posted June 18, 2014 - 9:34 pm

    I’ve always tried to keep my passwords reasonably strong but still something I could remember when I didn’t have access to a password manager. With all of the “reset your password immediately” warnings lately due to data breaches, that is becoming harder and harder for me.
  • Question

    Will Microsoft require mandatory updates to all versions of IE in order to receive security patches?

    Posted June 18, 2014 - 1:39 am

    Microsoft has apparently stopped automatic security updates to Internet Explorer 11 unless you install a mandatory update. I’m concerned that this may cause issues with other business applications that make use of Internet Explorer. Is this new policy limited to IE11 or has it been implemented for all versions of IE?
  • Question

    How to prevent someone using a photo to defeat facial recognition screen lock?

    Posted June 11, 2014 - 1:01 am

    My wife’s Android phone, a Galaxy S4, has a feature that uses facial recognition to unlock the device. One criticism I’ve heard criticism of this method is that someone can just use a photo of you to unlock it. Is there a way to prevent someone from using a photo to defeat the facial recognition security lock?
  • Question

    How to make sure I have latest firmware for SonicWALL firewall?

    Posted June 5, 2014 - 9:47 pm

    How can I make sure that the firmware is up to date on SonicWALL TZ100W security appliance?
  • Question

    What happened to TrueCrypt?

    Posted May 30, 2014 - 2:06 am

    TrueCrypt was supposed to be the last and best line of defense to keep data private through encryption. Now we find out that TrueCrypt is not secure. Did something get changed to cause this, or were we just blindly trusting in insecure software the entire time?
  • Question

    How to protect iPhones against ransomware attack?

    Posted May 30, 2014 - 1:19 am

    I know that ransomware has been a problem in the Windows world for a while, but now it has reached iPhones, and apparently it will make them unusable unless you pay up hundreds of dollars. What should iPhone users do to prevent an attack like this on their device?
  • Question

    How to created salted passwords?

    Posted May 28, 2014 - 8:51 pm

    I understand that salted passwords are significantly more secure in the event of a data breach, but how do you actually go about "salting" passwords?
  • Question

    How to monitor if I am being searched for online?

    Posted May 27, 2014 - 11:20 pm

    I remember reading an article a while ago about how to set it up to get alerts if someone searches for me online, but I can't remember where I read it. How can I monitor if I am being searched for?
  • Question

    Can someone spy on me?

    Posted May 23, 2014 - 7:47 pm

    Hi! This is going to read like a bad lifetime movie.. Please bear with me...
  • Question

    Has anyone received an email from eBay about its recent breach?

    Posted May 22, 2014 - 11:16 am

    Big story, but I haven't heard about (or received) an email notification to eBay users/customers. Hackers hit eBay database containing personal info, users asked to change passwords

  • Question

    How to make sure Silverlight is patched and up to date?

    Posted May 21, 2014 - 9:17 am

    From what I’ve read, Silverlight vulnerabilities are increasingly being exploited by hackers. As usual, many of the exploits take advantaged of unpatched vulnerabilities that exposes people that haven’t updated it and are running older versions.
Join us:






SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question