Robert LemosPCWorld

Veteran technology journalist Robert Lemos, a former research engineer, has covered technology and cybersecurity for almost two decades, winning numerous awards including a national journalism award in 2003 for his coverage of the MSBlast worm and recognition as a SANS Top Cyber Security Journalist in 2010 and 2014.

mcdonalds apple pay

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

Home automation security

5 steps to keep your smart home from being hacked

Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.

mobile security stock image one bad device

How to prevent mobile malware in 3 easy steps

Mobile malware tends to loiter in a few "bad neighborhoods" online that you should stay out of anyway.

Firewall

Secure your home network—and every device attached to it—in 3 simple steps

If major companies can be breached, is there anything home users can do to escape the same fate? Plenty, say security experts.

password stock image

3 easy steps to save yourself from stupid passwords

We all have them, and now's the time to make them both hacker-proof and easier to manage.

thinkstockphotos 158695294

The easy Java and Flash security fix everyone hates to do

You know those nagging Java update boxes that pop up in your desktop? They're actually kind of important.

freefromransomware primary

How to prevent ransomware: What one company learned the hard way

Ransomware is on the rise. Your best protection? Something everyone knows they should do.

internet of things iot stock

Internet of Things security check: How 3 smart devices can be dumb about the risks

Smartwatches, smart homes, smart connected cars: All carry software vulnerabilities that could impact your privacy or safety. But you can be smart about knowing the risks before you buy.

Reduce, Reuse, Recycle -- Just Not Your Password

In the wake of a breach, researchers typically focus on the poor password choices of users, but reuse is a much greater threat.

How We Moved Almost Everything to the Cloud: 5 Lessons

Companies that move to the cloud have a whole host of decisions, one of the first being whether to develop their own software on top of a cloud infrastructure or not.

Botnets Rebuild After Rustock Takedown

Multiple security providers see more malicious activity, as botnet operators attempt to grow their networks of compromised computers.

How to Shrink The Data Center: 4 Lessons Learned

The business that manages New York City's hospitals consolidates 11 data centers into two facilities, dispensing with two-thirds of their physical servers for a predicted savings of $70 million over 5 years. Consider these four tips.

Hackers Step Up Attacks on Security Firms

As attacks on the security infrastructure increase, we must ask if the firms responsible for our safety can protect themselves, much less us

DroidDream Turns Androids Into Zombies

Further analysis finds that the 50 malicious applications removed from the Android Marketplace include dropper functionality.

on techhive.com

Google Invites Hackers to Break In

The online giant kicks off an experimental program that allows security researchers to find bugs in its site