Security

Security | News, how-tos, features, reviews, and videos

bitcoin blockchain cryptocurrency scam fake currency falling apart
ipsecurity protocols network security vpn3

pc antivirus

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'

Facebook and Google recently owned up to new data breaches affecting millions of users. It's not the first time. It won't be the last. CSO's J.M. Porup explains what's really going on.

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

Broken window with Windows 10 logo

What the heck is it with Windows updates?

Lately, it’s been difficult to update Windows systems without running into some showstopping bugs. WTH is going on?

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

brain team iot analytics

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

patching against ransomware

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS...

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

Movie preview test pattern
Updated

Best security software: How 20 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software.

russian hacking us election  putin voting fraud hacked

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

screen shot 2018 09 21 at 10.43.22 am

Apple's dropping Back To My Mac Remote Access. Here's an Alternative, Currently Discounted.

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

1 network internet connected grid earth power satellite view

ICANN sets plan to reinforce internet DNS security

ICANN has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).

Computerworld > Mobile voting via phone / digital ballot

W. Va. to use blockchain-based mobile app for mid-term voting

The state will be the first ever to use a blockchain-enabled mobile voting app – developed by Voatz – to allow absentee voters to cast ballots in the mid-term elections this fall.

Load More