Don't-Miss Stories

Travel safely with your tech: How to prevent theft, loss and snooping on the road

All your pricey electronics are juicy targets for hackers and sticky-fingered thieves. Here's how to reduce your risks while traveling.

cybersecurity

Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014

The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.

icloud security primary 100412912 large

Forensic software gets around Apple's iCloud security features

Elcomsoft's Phone Breaker can pull data from iCloud accounts with a person's knowledge

hacker hand

TorrentLocker ransom rampage encrypts 285 million files and counting

ESET reveals secrets of crypto menace.

Protect Your Bottom Line by Making Sure Your Business is Compliant

If your office is still running Windows XP, you might be violating government regulations.

grinch linux

Linux 'grinch' vulnerability could put a hole in your security stocking

A potential flaw in how Linux handles access rights could give attackers entry, a security firm charges

quantum credit card

Quantum physics deployed in quest for fraud-proof credit cards

Researchers say attackers would be hard-pressed to hack a card with Quantum-Secure Authentication

androidsecurity

French researchers find that Android apps exploit permissions

A study found that one out of three apps access location, while two out of three track users' identities.

Holding masses of data, cybercriminals face new hurdles to cashing out

Hackers look for new ways to get higher margins on stolen data

SMBs Struggle in a Post-Windows XP Support World

Since the end of XP support, small businesses have faced myriad challenges keeping their companies competitive.