Are you clued up on this week's news?
Are you clued up on this week's news?
While NSA whistleblower Edward Snowden weighs into Allo controversy, Google 'cyber overlord' Thai Duong argues end-to-encryption is nice but what people really want is disappearing messages.
Online trackers add audio fingerprinting to their arsenal of tools to identify and follow people on the web.
The problem has been made worse due to vendors and users failing to update their firmware.
After the full extent of a LinkedIn breach was revealed, LeakedSource is one of the first to feel the effects.
The hacker's no Robin Hood, however, considering how the money was raised.
Encouraging companies to be honest about data breaches isn't enough, it seems. Some companies need more ... persuasion.
Well-known open-source developer and leader Brian Behlendorf is now the executive director of Hyperledger, a project for advancing enterprise open-source blockchain technology
The ten-line bill aims to stop the Supreme Court's rule change from taking effect.
Feds will have a harder time skirting the Fifth Amendment with a new fingerprint unlock rule.
Leak after leak, it's this one awful password that floats to the top of the list.
Can behavioral biometrics increase identity assurance and prevent online account takeover with continuous authentication for consumers? A new SDK from TeleSign aims to provide just that.
The developer has handed over the keys to the kingdom in a surprising twist in TeslaCrypt's tale.
The computer of one Bangladesh central bank official was targeted as the avenue into the bank's vaults.
We now know a lot more about the next version of Android, except its name. The most exciting new Android N feature is an answer to the age-old problem of pushing Android security updates to users.
Take a plunge into the world of cybersecurity with these recommended reads.
What are the best five ways to stay safe online? Security professionals weigh in with these quick tips.
Using Adobe Flash can put your security and privacy at risk. Here's how to disable the plugin on Windows and Mac, and all major browsers.
Need a new book or two to read on the beach this summer? Check out our recommendations for technology fans.
From encrypted instant messengers to secure browsers, these security and privacy apps are some of the very best for protecting your devices.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
With so many IT disasters occurring every day, it's hard to pick the worst of the worst, but here are some real standout foul-ups.
What is malware, what does it do and how do I protect myself?
What are phishing campaigns, why do they exist and how do I protect myself?
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
Here are five ways to secure the data on your Mac using both built-in tools and third-party utilities. All of these are robust tools that can thwart both casual snoopers and hardcore hackers. And on top of that, they won't cost you a dime.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.