Regin's a puzzle, with a long career that apparently has yet to affect the U.S. If that should happen, however, the classic protective measures will be your best defense.
The data breaches of 2014 have put all IT professionals on alert, but it's hard to tell whether they're as prepared as they think they are. Putting your own defenses in place is your best insurance.
DarkHotel's strategy is primitive but powerful, seeking out highly placed corporate users via vulnerable public networks. But there is a way to stay safe.
A survey by Intel Security shows great expectations for future IoT devices, but the things we’ll need to protect will become increasingly personal.
CurrentC wants to go head-to-head with Apple to become the mobile payment system of choice, but it's suffered a data breach of customer data before it’s even launched.
Windows automatic updates don’t work if you never restart the PC, and yet that seems to be the bottleneck for many, according to a survey of 4,500 Windows users
Microsoft issued a security advisory for the vulnerability, which resembles a flaw exploited in the Sandworm cyber espionage attacks.
Thanks to the FIDO Alliance's U2F open standard, a key drive or other small device could become a convenient, yet safe, authentication tool. The standard is backed by Google, Microsoft, Mastercard, Visa, PayPal and others,
A flaw in the SSL encryption protocol leaves vulnerable systems open to attack, but it’s an old, outdated protocol that most systems no longer use.
Two-factor authentication helps you protect your online identity even when the companies you do business with are breached or leak your data.
Phishing scams profit from your false sense of security. Protect yourself by learning how to look askance at any odd-seeming email.
The huge Android market is the focus of a joint report from Kaspersky Lab and INTERPOL. Among the many dangers, there are a few hopeful signs.
A new survey from BitDefender shows that more and more people use their own mobile devices for work, but the security measures to protect work-related data lag far behind the BYOD trend.
A new survey highlights how IoT and wearable technology adoption vary by age.
A UK financial institution has put together an interactive guide to online fraud and identity theft, along with links to tips and guidance to avoid being a victim.
Articles by Tony BradleyNext Page