Security

Security | News, how-tos, features, reviews, and videos

capitol dome congress
clicks pageviews traffic denial of service ddos attack 100613842 orig

botnet

IoT botnets target enterprise video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.

windows 7 logo in the rear view mirror

Microsoft delays Windows 7's update-signing deadline to July

The company's plans to move away from SHA-1 to SHA-2 for digital signatures for OS updates has been pushed back to mid-year.

vulnerable cryptojacking hacking breach security

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge.

headache man

The 11 biggest issues IT faces today

From securing IoT to retraining IT talent to finding new revenue streams, CIOs have more than their share of concerns keeping them up at night.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

intro data breach circuit board technology security

Data breaches exposed 5 billion records in 2018

New report from Risk Based Security shows a downward trend in number breaches and exposed records, Unclear if privacy regulations like GDPR are having an effect.

Mozilla Firefox headquarters

Mozilla to harden Firefox defenses with site isolation, a la Chrome

With 'Project Fission,' the developer hopes to wall off malicious sites and attack code so websites don't bring down the whole browser.

Android robot and gears emerging from isometric mobile phone screen

All about Android upgrades (and why they're late) | TECH(talk)

The release of a new version of Android always causes a hopeful stir among users. So why does it take so long for device makers to roll them out?

man in the middle phone on a string communicaiton

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are...

security display showing  biometric processing

What is biometrics? And why collecting biometric data is risky

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and more...

mac3

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike.

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

5 gdpr compliant notification documentation

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

10 threat landscape apocalypse ruins

Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists

The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.

data security

451 Research: Security is top data management challenge

A survey of highly qualified data management professionals by 451 Research shows that growing data volumes have made security their biggest concern.

pc antivirus

Best antivirus software: 11 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

secure encrypted internet web browser alert

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.

Load More