• Subscribe
Keyloggers: Beware this hidden threat

Keyloggers: Beware this hidden threat

Your every keystroke can easily be monitored by legitimate and illegitimate software lurking within your PC or phone.

06/28/17

Cybersecurity insurance: A new answer to online crime

Cybersecurity insurance: A new answer to online crime

Insurance companies see a lucrative opportunity in the rise of cyberbullying, hacking, ransomware, and revenge porn.

06/08/17

Password managers: The good, the bad, and the ugly

Password managers: The good, the bad, and the ugly

Besides antivirus protection, a password manager is the most important security tool you can use—if you know what to look for and what to avoid.

05/12/17

 Mac malware: Coming soon to a computer near you

Mac malware: Coming soon to a computer near you

The facts dispute the myth that Macs are immune to malware, and adware is the number one culprit.

05/04/17

How the new age of antivirus software will protect your PC

How the new age of antivirus software will protect your PC

Antivirus software ain't what it used to be. As the threats to our PC security evolve, we need new solutions that can keep up. Here's what the future of protection looks like.

09/29/16

Phone hacking: What the FBI won't reveal could hurt users, experts argue

Phone hacking: What the FBI won't reveal could hurt users, experts argue

Now that the FBI's proven you can hack into an iPhone, the question is whether that vulnerability should be revealed to protect users--or kept secret so it can be used again. Here's what experts argued at a recent Congressional...

07/27/16

This is what your messaging app needs to be truly secure

This is what your messaging app needs to be truly secure

You may love your messaging app, but your messaging app may not love your security. These are the features to look for to protect yourself.

07/07/16

How greed could destroy the ransomware racket

How greed could destroy the ransomware racket

Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing.

06/28/16

All about your 'fullz' and how hackers turn your personal data into dollars

All about your 'fullz' and how hackers turn your personal data into dollars

Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.

06/02/16

How to keep USB thumb drive malware away from your PC

How to keep USB thumb drive malware away from your PC

Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.

05/18/16

What to ask your doctor, lawyer, and accountant about protecting your personal data

What to ask your doctor, lawyer, and accountant about protecting your personal data

Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to...

05/03/16

Phone hackers for hire: A peek into the discreet, lucrative business tapped by the FBI

Phone hackers for hire: A peek into the discreet, lucrative business tapped by the FBI

When the FBI paid someone to crack the San Bernardino shooter’s iPhone, it didn’t just deftly bypass Apple’s objections. It also made the public aware of the business side of hacking—a business that is apparently as lucrative as it is...

04/29/16

Spotty Android encryption is the story behind the story of Apple’s battle with the FBI

Spotty Android encryption is the story behind the story of Apple’s battle with the FBI

Google has tried and largely failed so far to make encryption a standard on Android phones, an increasingly uncomfortable situation now that they're targets for law enforcement.

04/18/16

Online privacy: 3 ways to ward off cyber criminals and snoops

Online privacy: 3 ways to ward off cyber criminals and snoops

Keep yourself safe with these online security tips, from anonymous browsing to hiding your digital tracks.

03/04/16

How to make bad passwords better, and more hope for the future of authentication

How to make bad passwords better, and more hope for the future of authentication

We know passwords are a pain. We're not expecting miracles. But these tips can keep you from the dumbest mistakes. .

02/04/16

Why stolen laptops still cause data breaches, and what's being done to stop them

Why stolen laptops still cause data breaches, and what's being done to stop them

It just takes one lost laptop to ruin a company's security. Some firms have solid plans for managing the risk. Does yours?

01/13/16

Ransomware's latest threats: What to do about CryptoWall, Chimera and their ilk

Ransomware's latest threats: What to do about CryptoWall, Chimera and their ilk

In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.

11/19/15

Trust no one: How caller ID spoofing has ruined the simple phone call

Trust no one: How caller ID spoofing has ruined the simple phone call

Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.

08/04/15

The 3-step plan to make your website harder to hack

The 3-step plan to make your website harder to hack

Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.

07/09/15

NFC security: 3 ways to avoid being hacked

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

06/26/15

Load More