Articles about Security
More than one third of encrypted Websites are open to attack via the FREAK security hole.
Box has made a few strategic, product-drive acquisitions in the last several years with its latest purchase tapping into BYOD.
IT will need to integrate multiple management systems as "Things" take on identities and access controls
China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.
While Silent Circle's encrypted devices and services look tempting, there are now free end-to-end encryption services available.
Bad news, good hackers, and compliance are driving encryption adoption. This briefing covers encryption technologies, trends, and elements of planning and strategy.
from TechProResearch »
Hackers will always get through...when they do, don't shut them out. Watch them for a few hours says security firm Cybereason...
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
If MPs can't even be bothered to learn about the work tools they use every day, what hope is there for intelligent debate on mandatory data retention?
The latest round of Xen security fixes won't disrupt Amazon Web Services customers.
UPDATED: The search giant will let phone makers decide whether or not to enable encryption-by-default because of performance issues on older devices.
The Cryptocat developer's new team aims to get easy file and message encryption into everyone's hands, which could give Gmail and Dropbox (and the NSA) a run for their money.
The next evolution of the internet will embed sensors into nearly everything around us. Dealing with the privacy and security implications of that will be one of the biggest challenges of the next century.
When it preinstalled the Superfish adware on consumer PCs, Lenovo sold its customers out for a pittance, but it still hasn't had to disclose how much it received. Maybe it's time for a Truth in Labeling act to shine a light on this dark corner of the PC market.
Could 'invisibility' glasses become the next trend in cities crawling with cameras and full of facial recognition technology?
What cybersecurity trends can we expect to see in the coming year?
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
And now, for your reading pleasure, we present the worst products and services and technology screw-ups of 2014.
When it comes to the specs, especially in the security architecture, Apple Pay looks good. But Apple isn't the only game in town when it comes to the retail space, and there are a lot of factors that might make this less of a slam-dunk than Apple might like. We look at six of them here.
Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.