Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

linux tux mascot logo
security lock code

Intel logo

Intel asserts its trademark rights against John McAfee

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or...

NSA headquarters

Ex-NSA contractor hoarded two decades' worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.

Internet cyber security

RASP rings in a new Java application security paradigm

Runtime-based technologies use contextual awareness to boost Java application security


Indian banks replace millions of debit cards after possible breach

Indian banks blocked or asked customers to change their PINs on 3.2 million debit cards after concerns about a security breach.

Security (3)

Free tool protects PCs from master boot record attacks

A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.

1 immersive

Why you need to develop an immersive security strategy

Immersive security is a radical approach that utilizes advanced visualization techniques to enable a multidimensional situational awareness of the network. By being ‘in the data’ security professionals are able to better and more...

Common crypto mistakes criminals makes

Stupid encryption mistakes criminals make

Blown cover: Malware authors show how easy it is to get encryption wrong and, in the process, help security pros crack their code

russian police

LinkedIn blames Russian hacking suspect for 2012 breach

A suspected Russian hacker arrested recently in the Czech Republic was involved in a massive 2012 data breach at LinkedIn, the professional social networking company says.

yahoo mail

Yahoo asks US for clarity on email scanning controversy

Yahoo is asking that the U.S. government set the record straight on requests for user data, following reports saying the internet company has secretly scanned customer emails for terrorism-related information.

Security online

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found.

robert gates

Politics keeps the U.S. from securing private-sector networks, says former CIA chief Robert Gates

Gates, a former U.S. Secretary of Defense, regaled the IT audience at the Gartner Symposium/ITxpo with tales of old tech, including helicopter pilots having to grab film capsules before they hit the ground.

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

20151027 oracle cloud on building

Oracle fixes 100s of vulnerabilities that put enterprise data at risk

Oracle has released another large batch of patches, fixing many critical vulnerabilities in enterprise products that are used to store and work with critical business data.

shaking hands

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together.

assange on balcony

Ecuador says it cut WikiLeaks founder's internet access to prevent U.S. election interference

Ecuador's embassy in the U.K. says it alone was responsible for cutting WikiLeak's founder Julian Assange's internet connection, stating that the country doesn't want to interfere with the U.S. elections.

security code big data cyberespionage DDoS

Hackers create more IoT botnets with Mirai source code

Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released.

malware payment terminal credit card

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection.

assange on balcony

WikiLeaks blames US for cutting Assange's internet connection

WikiLeaks is accusing U.S. secretary of state John Kerry of trying to stop the site from publishing stolen emails from a Hillary Clinton aide

Load More