Can you tell the difference between the real and the spoofed?
Can you tell the difference between the real and the spoofed?
The social networking giant received almost twice as many classified national security demands as the year before.
The security and privacy certifications set the stage for more regulatory checkboxes need to land enterprises.
CloudFlare customers can tap into the protocol to shave loading times off their domains.
Mozilla fixes critical bugs in Firefox 46 and makes progress in Firefox 47 on moving to a plugin-free future for video streaming.
Amazon Web Services is evangelising itself as a full-service cloud provider, but limited availability in Asia may mean some customers in the region can't deploy several of its offerings.
Zero-knowledge encryption can help keep your information assets safe when they're stored in the cloud. Ed Bott looks at some of your best options.
Qatar National Bank (QNB) has suffered a data breach leading to the theft of 15,000 sensitive files.
Minecraft fan community Lifeboat suffered a data breach in January leading to the leak of account data belonging to seven million users.
The bill unanimously passes the House in a 419-0 vote.
In today's high-threat environment, multi-factor authentication is a critical component to safeguarding all your accounts.
Secunia's latest reports of software vulnerabilities on PCs running Microsoft Windows should prompt users to patch all their software, and uninstall both Apple QuickTime and Oracle Java.
One of the agency's first whistleblowers says the NSA is taking in too much data for it to handle, which can have disastrous -- if not deadly -- consequences.
Pirate Bay users have been hit with talking crypto-ransomware, according to security researchers.
This ransomware is particularly nasty as it does not just lock your files, but also steals your data and any Bitcoin you have stored on your PC.
Researchers have discovered a phishing campaign which uses Facebook's security measures to appear legitimate.
What are the best five ways to stay safe online? Security professionals weigh in with these quick tips.
Using Adobe Flash can put your security and privacy at risk. Here's how to disable the plugin on Windows and Mac, and all major browsers.
Need a new book or two to read on the beach this summer? Check out our recommendations for technology fans.
From encrypted instant messengers to secure browsers, these security and privacy apps are some of the very best for protecting your devices.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
With so many IT disasters occurring every day, it's hard to pick the worst of the worst, but here are some real standout foul-ups.
What is malware, what does it do and how do I protect myself?
What are phishing campaigns, why do they exist and how do I protect myself?
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
Here are five ways to secure the data on your Mac using both built-in tools and third-party utilities. All of these are robust tools that can thwart both casual snoopers and hardcore hackers. And on top of that, they won't cost you a dime.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
When a person passes away, their social account can become a memorial of their life, friendships and experiences. See step-by-step instructions for selecting your legacy contact.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.