Security

Security | News, how-tos, features, reviews, and videos

credit card fraud
young man using a laptop with a security display in the background

thor web browser dark web binary onion

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

best home security cameras
Update

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Duty of care: Why (and how) law firms should up their security game

Lawyers have been slow to adopt modern technology — and even slower to respond to security threats. That may be changing.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

network security woman code monitor

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead...

Network World: IoT Hacks [slide-01] > Strange and Scary IoT Hacks

Strange and scary IoT hacks

The Internet of Things has provided a worldwide digital playground for hackers, pranksters and those who would thwart them and here are 9 of the most unnerving.

headphones espionage monitoring

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

android anti virus security

Best Android antivirus? The top 12 tools

There are plenty of antivirus tools for Android. Here's how the top 12 measure up in protection, usability and features.

woman phone scam

4 scams that illustrate the one-way authentication problem

These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.

skull and crossbones in binary code

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

iPhone security / unlocking, hacking or breaking into iPhone

Supreme Court: Your digital location is protected by the Constitution

In a landmark decision, the Supreme Court Friday affirmed that law enforcement must obtain a warrant to access mobile phone location data collected by wireless providers – a win for consumer privacy.

apple wwdc2018 privacy

Apple pushes privacy theme in Safari for iOS 12, 'Mojave'

The browser is getting new privacy and security tricks, including better integration with third-party password managers and less tracking with cookies.

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

iPhone security / unlocking, hacking or breaking into iPhone

Apple wins praise for adding 'USB Restricted Mode' to secure iPhones

Amid reports that two forensic companies have been helping law enforcement and government agencies break into locked iPhones, Apple rolled out a new feature in iOS 12 to prevent further intrusions. Privacy advocates applauded the move....

astract code [Thinkstock]

What’s new in PHP 7.3

The production release is planned for November 29, 2018

android vs iOS security boxing gloves battle

Apple bans cryptocurrency mining apps on iOS to protect mobile users

Apple has created new rules for app developers that ban the creation of cryptocurrency mining services on mobile devices.

pc antivirus

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

Load More