Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

pc antivirus
draft eprivacy regulation   privacy by design

executive looking over cliff with large gap

How to manage IT risk without killing innovation

Success in managing the hidden risks of new initiatives will buy you credibility to invest further in innovation.

agile devops

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

CSO: Have you met these hackers? [slide 01]

10 types of hackers and how they'll harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]
video

Mingis on Tech: All about Android security

Google's Android operating system sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception.

mobile phone - privacy - security

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

04 cyberlaws gavel

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

program dirty 2018.04.23 12.03.07.00 07 37 15.still001
video

Mingis on Tech: The lowdown on Android security

Google's Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception and how users can keep their devices safe.

Microsoft cites 24% jump in tech support scams

According to the FBI, cybercrooks have changed tactics and sometimes pose as government agents or tech support reps for GPS, printer or cable companies, or virtual currency exchangers.

European Union, EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

internet tubes

Internet exchange points team up to bring better MANRS to the internet

Enterprises stand to benefit from ISOC's latest campaign to get IXPs to clean up internet routing security

phishing hack scam malware binary code

Microsoft boosts anti-phishing skills of Chrome, the IE and Edge killer

The company has released an add-on for Chrome – dubbed 'Windows Defender Browser Protection' – that effectively gives up a major asset in its own Edge browser.

data center servers and monetary symbols

N.Y. AG's scrutiny of cryptocurrencies unlikely to stymie a thriving industry

The New York Attorney General's office is looking into the practices and policies of cryptocurrency exchanges; experts say any ensuing regulation will likely protect investors while allowing the marketplace to continue growing.

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

avast security pro for mac icon

Avast Security Pro for Mac review: Everything a modern antivirus app needs and a little bit more

An all-around champion has strong malware-fighting abilities packaged with worthwhile extras.

trend micro logo

Trend Micro Antivirus for Mac review: Solid malware prevention with no frills

Trend Micro Antivirus has a solid set of features and performs very well in malware detection and blocking, including intercepting some kinds of ransomware.

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

iPhone security / unlocking, hacking or breaking into iPhone

How to use a strong passcode to better secure your iPhone

With at least two companies selling technology that can be used by law enforcement and government agencies to unlock iPhones, this would be a good time to safeguard your information with a stronger passcode. Here's how.

windows hello fingerprint

What is Windows Hello? Microsoft’s biometrics security system explained

Windows Hello gives Windows 10 users an alternative way to log into their devices and applications using a fingerprint, iris scan or facial recognition. Here’s what the technology does, who uses it and the hardware required.

Load More