Don't-Miss Security Stories

SSL padlock icon

Google turns on HTTPS for all Blogspot blogs

All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection.

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits for privacy-obsessed PC users

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

imagetragick logo

Critical flaws in ImageMagick library expose millions of websites to hacking

A tool used by millions of websites to process images has several critical vulnerabilities that could allow attackers to compromise Web servers.

Digital Key, security, encryption

Quantum computers pose a huge threat to security, and the NIST wants your help

It's no secret that quantum computers could render many of today's encryption methods useless, and now the National Institute of Standards and Technology wants the public to help it head off that threat.

20160330 satya nadella build16

Microsoft's CEO explains why his company sued the U.S. government

Microsoft CEO Satya Nadella explained in an interview that Microsoft is fighting what it sees as government overreach in the realm of digital privacy because he thinks that the U.S. can be a beacon to other countries.

okta office photo

Okta offers Touch ID-based multifactor authentication for iPhones

Okta, a San Francisco-based identity management startup, announced Monday a bunch of updates to its products that are aimed at improving its offerings on mobile devices.

padlock and chain, security

Qatar National Bank claims customer data released by hackers is authentic

Qatar National Bank has admitted that its systems were hacked but said that the information released online was a combination of data picked up from the attack and from other sources such as social media.

blockchain code

IBM offers advice on how to secure blockchain in the cloud

Cloud providers hosting the blockchain secure transactions technology should take additional security steps to protect those records, IBM recommends

Digital Key, security, encryption

Toy maker Maisto’s website pushed growing CryptXXX ransomware threat

The website of toy maker Maisto was infected with malicious code that distributed CryptXXX, a new and increasingly widespread ransomware program.

Android apps (2)

Phishing apps posing as popular payment services infiltrate Google Play

Researchers from security firm PhishLabs found 11 phishing applications hosted on Google Play this year, targeting users of popular online payment services.

spying eye

Supreme Court approves rule change that expands FBI computer search powers

The Supreme Court has adopted amendments to a rule to give judges the authority to issue warrants to remotely search computers whose locations are concealed using technology.

slack icon

Developers leak Slack access tokens on GitHub, putting sensitive business data at risk

Developers from hundreds of companies have included access tokens for their Slack accounts in public projects on GitHub, putting their teams' internal chats and other data at risk.

isis flag graphic

ISIS cyberattack capabilities are unorganized, underfunded—for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.

Fraud gang targeted large European companies

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man was sentenced Tuesday to 87 months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.

US Capitol

In rare unanimous move, House passes bill to protect email and cloud privacy

The U.S. House of Representatives has approved a bill to strengthen privacy protections for email and other data stored in the cloud.