Security Measures Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing.
Security Measures Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.
Security Measures Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.
Security Measures Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to check out their providers' security.
Security Measures In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.
Security Measures Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
Security Measures Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
Security Measures More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.
Security Measures Security researchers needed just 5 to 20 minutes to hack most smart-home devices. Learn how to keep real hackers at bay with these five strategies.
Security Measures If major companies can be breached, is there anything home users can do to escape the same fate? Plenty, say security experts.
Security Measures Smartwatches, smart homes, smart connected cars: All carry software vulnerabilities that could impact your privacy or safety. But you can be smart about knowing the risks before you buy.