Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

'Abandoned sum' email scam goes retro

'Abandoned sum' email scam goes retro

How many "abandoned sum" emails have you received? Hundreds if not thousands, if you've been online for a couple of decades. But the world must be running out of gullible email users, so the scam has gone retro: snail mail. Here's what it looks like.

16 hours ago by

10 Linux distros: From different to dangerous

10 Linux distros: From different to dangerous

One of the great benefits of Linux is the ability to roll your own. Throughout the years, individuals, organizations, and even nation states have done just that. In this gallery, we're going to showcase some of those distros. Be careful, though. You may not want to load these, or if you do, put them in isolated VMs. We're not kidding when we say they could be dangerous.

August 19, 2019 by

2019's tech, security, and authentication trends

2019's tech, security, and authentication trends

We take a look at the top tech, cybersecurity, and authentication trends as revealed today by the Duo Security's 2019 Trusted Access Report, which includes data from 24 million devices, one million apps and services, and billions of authentications.

July 16, 2019 by

Top Stories