Insurance companies see a lucrative opportunity in the rise of cyberbullying, hacking, ransomware, and revenge porn.
Besides antivirus protection, a password manager is the most important security tool you can use—if you know what to look for and what to avoid.
Antivirus software ain't what it used to be. As the threats to our PC security evolve, we need new solutions that can keep up. Here's what the future of protection looks like.
Now that the FBI's proven you can hack into an iPhone, the question is whether that vulnerability should be revealed to protect users--or kept secret so it can be used again. Here's what experts argued at a recent Congressional...
You may love your messaging app, but your messaging app may not love your security. These are the features to look for to protect yourself.
Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.
Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.
Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to...
When the FBI paid someone to crack the San Bernardino shooter’s iPhone, it didn’t just deftly bypass Apple’s objections. It also made the public aware of the business side of hacking—a business that is apparently as lucrative as it is...
Google has tried and largely failed so far to make encryption a standard on Android phones, an increasingly uncomfortable situation now that they're targets for law enforcement.
Keep yourself safe with these online security tips, from anonymous browsing to hiding your digital tracks.
We know passwords are a pain. We're not expecting miracles. But these tips can keep you from the dumbest mistakes. .
It just takes one lost laptop to ruin a company's security. Some firms have solid plans for managing the risk. Does yours?
In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.
Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.
Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.
You Might Also Like
Top Blog Posts