Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Question

    How can websites track my activity if I block and delete cookies?

    Posted May 16, 2014 - 10:00 pm

    Can I still be tracked by websites if I block and delete cookies? Are there other things that allow me to be tracked?
  • Question

    How much validity to claims that antivirus software is “dead?”

    Posted May 13, 2014 - 9:50 pm

    Symantec's Senior VP Brian Dye said during an interview with The Wall Street Journal that antivirus software “is dead” and the company no longer considers it a money maker.

  • Question

    How to protect against Android ransomware?

    Posted May 6, 2014 - 11:19 pm

    Apparently the ransomware that has been a problem on PCs has reached Android now. Users with it on their device get a screen that comes up and stays up, with a “warning” that they have viewed illegal content and their device is now encrypted.
  • Question

    How to tell if websites honor “Do Not Track” requests?

    Posted May 2, 2014 - 9:00 pm

    I know that Yahoo just announced that it will ignore the Do Not Track (“DNT”) requests of visitors to its sites, but how can you tell if other websites are ignoring it?
  • Question

    What is tokenization?

    Posted May 1, 2014 - 9:17 pm

    The term “tokenization” came up during a presentation on data security today, but it wasn’t really explained. What is tokenization?
  • Question

    Did Microsoft make a mistake by patching IE for Windows XP?

    Posted May 1, 2014 - 8:52 pm

    Microsoft made “a one time exception” to patch the current Internet Explorer zero day exploit for Windows XP, even though support for XP has ended. I’m wondering if this may have unintended consequences.
  • Question

    How to choose a password manager?

    Posted April 29, 2014 - 4:27 pm

    I’ve never used one before, and I don’t really know what to look for. However, with all the security breaches lately and the resultant password changes, this seems like that time to start. What should one look for when choosing a password manager?
  • Question

    Why is open source software generally considered more secure?

    Posted April 29, 2014 - 4:01 pm

    More than once I’ve heard people say that if software is not open source, it isn’t really secure. Is there any truth to this, and if so, why?
  • Question

    How to make Resident Shield active in AVG Anti-virus?

    Posted April 25, 2014 - 11:17 am

    Resident Shield, which provides most of the anti-virus function of AVG outside of scanning, switched off on my laptop and I get a message that says “Warning: Your computer is not fully protected! Resident Shield is not active.” I can’t figure out how to turn it back on.
  • Question

    How secure is the fingerprint scanner on the Galaxy S5?

    Posted April 23, 2014 - 5:57 am

    When the iPhone 5S came out, I remember reading about the fingerprint scanner being relatively easy to defeat. Does anyone know if the fingerprint scanner in the new Samsung Galaxy S5 is comparable to using a PIN, or is it more of “casual” security feature that is there mainly because Apple made one first?
  • Question

    How to safely use open WiFi hotspots?

    Posted April 18, 2014 - 11:47 am

    When I’m using open WiFi networks for anything more than a quick bit of casual browsing, what steps are necessary to stay secure?
  • Question

    Will all US smartphones have a kill switch in 2015?

    Posted April 18, 2014 - 6:32 am

    After years of the wireless industry arguing against having kill switches in smartphones and opposing regulations that would mandate it, there was an announcement that kill switches would be in devices starting in 2015.
  • Question

    How much is personal information actually worth to hackers?

    Posted April 16, 2014 - 8:28 pm

    All of the recent security issues in the news makes me curious - How much are my personal details and information worth in real dollars? Is there an actual "going price" on personal information in the “black hat” marketplace?
  • Question

    What is a zero day vulnerability?

    Posted April 15, 2014 - 7:23 pm

    I understand zero day to mean that there is a serious security issue, but I don’t know what it actually means. Where does the term “zero day” come from?
  • Question

    How to reset Apple ID that was “disabled for security reasons?”

    Posted April 14, 2014 - 8:35 pm

    Whenever I enter my password, I get an error message that says “This Apple ID has been disabled for security reasons.” I think my youngest daughter tried to log in and may have caused this to happen. What do I need to do to get my Apple ID reinstated?
  • Question

    What is OpenSSL?

    Posted April 14, 2014 - 4:46 pm

    Like everyone else, I’ve heard a lot about OpenSSL since the Heartbleed security flaw was discovered. I understand that it is intended to encrypt website traffic, but is OpenSSL just the actual software that is supposed to do this? It seems hard to believe that it took two years for such a major flaw to be discovered.
  • Question

    What does the Heartbleed bug effect beyond websites?

    Posted April 10, 2014 - 8:27 pm

    Once website have fixed the vulnerability, will there be any ongoing problems as a result of the Heartbleed bug?
  • Question

    How to minimize risks of Heartbleed OpenSSL bug?

    Posted April 9, 2014 - 12:18 pm

    What can be done to minimize the risk of the Heartbleed bug while online? How significant is the security risk to the average internet user?
  • Question

    cloud printing to a standard printer connected to XP pc

    Posted April 8, 2014 - 5:43 pm

    To print from google cloud print to a standard (non-cloud) printer the printer must be connected to a computer with a wifi connection that runs google chrome. My printer is connected to a pc with the XP OS which became unsupported today.
  • Question

    What to do if you are not going to be able to replace Windows XP by May 13, 2014?

    Posted April 1, 2014 - 7:48 pm

    I think we will have all of the PCs in our office upgraded from Windows XP by the time support ends on May 13, but then again, maybe not. What should be done to minimize risks if you can’t get everything upgraded in time?
  • Question

    Where does “Atom feed” Google account activity originate?

    Posted March 26, 2014 - 4:38 pm

    I checked my Google account activity using the link at the bottom right of Gmail (saw this on an ITworld question last week, incidentally), and under “access type” there are a number of times that “Atom feed” accessed my account. I was freaked out for a second, but then I noticed the IP address for Atom feed was the same as mine.
  • Question

    How does Google determine that the apps on Google Play are safe?

    Posted March 24, 2014 - 10:50 pm

    One of the standard pieces of advice that is given about improving security and avoiding malicious apps on Android devices is to only download applications from a trusted source, which means Google Play, and to a lesser extent Amazon’s app store. But how does Google ensure that the apps on Play are safe?
  • Question

    How can Microsoft legally read a blogger’s hotmail emails to find the source of a leak?

    Posted March 21, 2014 - 12:55 am

    Microsoft apparently went through the hotmail account of the blogger who posted leaked Windows code to find the source of the leak. Can they just do this? Is it legal for them to just go through and read peoples' emails whenever they have what they think is a good reason to do so?
  • Question

    How safe is it to deposit checks using smartphones?

    Posted March 12, 2014 - 3:15 am

    In my bank statement this month, there was an insert about depositing checks to my account using either an Android phone or iPhone. It looks pretty much all you do is take a photograph of the check, confirm that the amount is correct, and Bob’s your uncle. I’m a little skittish about this though; is it really secure?
  • Question

    What type of activities should be avoided when using public Wi-Fi?

    Posted March 12, 2014 - 2:23 am

    When using my laptop or tablet with public WiFi, say at a coffee shop, what types of things should be avoided? I don’t do any banking, for example, but am I just being paranoid? How can I safely use public WiFi?
Join us:






Join today!

See more content
Ask a Question