Articles about Security
[UPDATED] We have had an absolute deluge of problem updates from Redmond recently and some have been serious. What's up at Microsoft?
The tragic story of pioneering computer scientist Alan Turing makes for an interesting and enjoyable movie, but many personal and technological details are glossed over in this treatment.
The group taking responsibility for the Sony hack have promised to give the firm a Christmas present it won't forgot -- unless staff ask politely for documents to be kept secret.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
One of several updates for various versions of Exchange Server released Tuesday, the Exchange Server 2010 SP3 Update Rollup 8, was pulled Wednesday and reissued Friday.
October updates to Office 2010 and 2013 could cause problems with field updates in Microsoft Word. The faulty update is unclear at this point.
Number of attacks peaks driven by attempts to steal money online during the World Cup.
New rules will stop apps from interfering with user control of extensions and settings in all browsers. Other products do this, but Microsoft now makes it a baseline protection.
Trying to buy confidential office hardware, or a surprise gift? Advances in ad retargeting will broadcast your intentions across the internet and all your devices unless you cover your tracks.
[Correction] A multithreaded, multi-core engine should greatly improve throughput. A more powerful shell interface, more user-friendly design and simpler rule language make it more accessible.
GCHQ's tablet app allows users to use encryption to create and crack messages
Doesn't it seem like RHEL 7 just came out the other day? Well, brace yourself, the next version is already on its way.
A collection of notable security news items for the week ending December 12, 2014. Covers enterprise, controversies, reports and more.
Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are six things you can do to secure your network.
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
What are some of the best apps on the market to keep your iPhone and iPad safe, secure, and able to be located?
If you have just one password for everything it's easy to remember, but we all know that isn't safe. So how do you keep track of a large number of them - and not have to worry about it?
Behind on the news and hungry for more? Here's what we learned this week — including which city is doing more for tech than Silicon Valley, and Samsung's biggest ally.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
If you're late to upgrade or have decided not to change your operating system, check out these tips to keep the system as secure as possible.
This high tech, hurricane-resistant and ultra-secure facility in Fort Lauderdale is where Florida's elite store their exotic cars, precious valuables, works of art and wine collections.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.