Security

Security | News, how-tos, features, reviews, and videos

bloomberg big hack
man typing on laptop search internet web browswer

ios12 iphone x alerts

How to download the personal data that Apple collects from you

Apple’s privacy website also now lets you get a copy of the data that Apple collects about you. Here’s how to get yours now.

mullvadhero

Mullvad 2018 review: A fantastic VPN has a great new look

Mullvad is back with a great looking new app, more country locations, and the same solid commitment to performance and privacy.

Microsoft Windows 10 logo bandage data map
Updated

Best new Windows 10 security features: More patching, updating flexibility

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1809 feature release.

7 safe browswer search legitimate url domains surfing the internet

Big browsers to pull support plug for TLS 1.0 and 1.1 encryption protocols in early '20

TLS is the successor to the better-known SSL (Secure Socket Layer) encryption protocol; both are used to secure data communications between browsers and the destination server.

supply chain management problems in need of solutions

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

bitcoin blockchain cryptocurrency scam fake currency falling apart

Economist Nouriel Roubini: Blockchain and bitcoin are the world’s biggest scams

The economist who predicted the 2008 financial collapse has been telling congressional leaders that bitcoin and blockchain represent a significant threat to the stability of the financial marketplace. But he's getting pushback.

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

antivirus hub
Updated

Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more

Your PC needs virus protection, full stop. No matter how careful you are, some threats can't be avoided without the aid of antivirus software. Our top picks will keep you protected.

pc antivirus

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'

Facebook and Google recently owned up to new data breaches affecting millions of users. It's not the first time. It won't be the last. CSO's J.M. Porup explains what's really going on.

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

kaspersky logo flag resized

Kaspersky Total Security 2019 review: A fantastic security suite available at a better price

Kaspersky 2019 is the same antivirus suite it's always been with improved system tools and a better price.

Broken window with Windows 10 logo

What the heck is it with Windows updates?

Lately, it’s been difficult to update Windows systems without running into some showstopping bugs. WTH is going on?

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

Load More