Security

Security | News, how-tos, features, reviews, and videos

Man pointing to security icon for email
pc antivirus

credit cards

Hack mobile point-of-sale systems? Researchers count the ways

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

8th gen intel core u series back
Updated

Foreshadow attacks Intel CPUs with Spectre-like tactics (but you're probably safe)

Intel introduces L1TF or Foreshadow, a new speculative execution attack like Spectre and Meltdown, which targets SGX instructions on Intel's Core chips.

mobile apps crowdsourcing via social media network [CW cover - October 2015]

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

Facebook / network connections / privacy / security / breach / wide-eyed fear

Does Facebook even need a CSO?

Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.

phishing threat

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

binary code, magnifying lens, skull and crossbones

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

concentric rings of digital security with a lock at the center

Preparing for the day quantum computing cracks public-key cryptography: What to do now

Quantum computers could crack public-key encryption in as little as five years. Here's how to prepare for the post-quantum world.

hidemelogo

Hide.me review: A good service with zippy servers

Hide.me is a great service with an easy-to-use app, solid speeds, but it'd be better if we knew who was behind the service.

smoke detector hub
Product Hub

Best smart smoke detector to keep your home safe

Smart smoke and carbon monoxide detectors don’t just sound the alarm, they also alert your smart phone and more.

Leeo Smart Alert Nightlight
Updated

Leeo Smart Alert Nightlight review: $100 is cheap if it saves your house from burning down

It plugs into an AC outlet, alerts you to smoke and carbon monoxide alarms, and contacts you via an app with a recording of the sound. A few false alarms aside, this security device is a smart buy for any home.

phishing threat
Awareness

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

An armored knight armor with halo and wings holds a shield, layered in Microsoft brand colors.

How Microsoft became tech’s good guy

Even if it’s doing so out of self-interest, the company has been acting as a force for good.

primary laptop with certificate degree for technology

Top bachelors and masters cybersecurity degree programs

These are some of the best on-campus and online cybersecurity degree programs helping to meet the cybersecurity job demand.

security breach egg reveal locks binary code hacked

Cisco pays cool $2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

quantum

How quantum computers will destroy and (maybe) save cryptography

Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.

Load More