• Subscribe
Keyloggers: Beware this hidden threat

Keyloggers: Beware this hidden threat

Your every keystroke can easily be monitored by legitimate and illegitimate software lurking within your PC or phone.

06/28/2017

Cybersecurity insurance: A new answer to online crime

Cybersecurity insurance: A new answer to online crime

Insurance companies see a lucrative opportunity in the rise of cyberbullying, hacking, ransomware, and revenge porn.

06/08/2017

Password managers: The good, the bad, and the ugly

Password managers: The good, the bad, and the ugly

Besides antivirus protection, a password manager is the most important security tool you can use—if you know what to look for and what to avoid.

05/12/2017

 Mac malware: Coming soon to a computer near you

Mac malware: Coming soon to a computer near you

The facts dispute the myth that Macs are immune to malware, and adware is the number one culprit.

05/04/2017

How the new age of antivirus software will protect your PC

How the new age of antivirus software will protect your PC

Antivirus software ain't what it used to be. As the threats to our PC security evolve, we need new solutions that can keep up. Here's what the future of protection looks like.

09/29/2016

Phone hacking: What the FBI won't reveal could hurt users, experts argue

Phone hacking: What the FBI won't reveal could hurt users, experts argue

Now that the FBI's proven you can hack into an iPhone, the question is whether that vulnerability should be revealed to protect users--or kept secret so it can be used again. Here's what experts argued at a recent Congressional...

07/27/2016

This is what your messaging app needs to be truly secure

This is what your messaging app needs to be truly secure

You may love your messaging app, but your messaging app may not love your security. These are the features to look for to protect yourself.

07/07/2016

How greed could destroy the ransomware racket

How greed could destroy the ransomware racket

Ransomware attackers have a good thing going: Lock or encrypt your PC remotely, then demand money to release it. Unfortunately, greed is driving them to do the one thing they shouldn't do if they want the cash to keep flowing.

06/28/2016

All about your 'fullz' and how hackers turn your personal data into dollars

All about your 'fullz' and how hackers turn your personal data into dollars

Piecing together a full financial and medical profile—a so-called "fullz"—is how hackers turn your data into dollars. We talk to the experts about the fullz problem and what you can do about it.

06/02/2016

How to keep USB thumb drive malware away from your PC

How to keep USB thumb drive malware away from your PC

Maybe you know not to plug strange USB drives into your computer, but trends indicate that most people think nothing of it. Here's how security experts keep USB malware at bay.

05/18/2016

What to ask your doctor, lawyer, and accountant about protecting your personal data

What to ask your doctor, lawyer, and accountant about protecting your personal data

Criminals file for fraudulent tax refunds using consumers' information. Law firms are being hacked. The trend is clear: People have to worry about the security of their third parties. Lessons for consumers on what they should do to...

05/03/2016

Phone hackers for hire: A peek into the discreet, lucrative business tapped by the FBI

Phone hackers for hire: A peek into the discreet, lucrative business tapped by the FBI

When the FBI paid someone to crack the San Bernardino shooter’s iPhone, it didn’t just deftly bypass Apple’s objections. It also made the public aware of the business side of hacking—a business that is apparently as lucrative as it is...

04/29/2016

Spotty Android encryption is the story behind the story of Apple’s battle with the FBI

Spotty Android encryption is the story behind the story of Apple’s battle with the FBI

Google has tried and largely failed so far to make encryption a standard on Android phones, an increasingly uncomfortable situation now that they're targets for law enforcement.

04/18/2016

Online privacy: 3 ways to ward off cyber criminals and snoops

Online privacy: 3 ways to ward off cyber criminals and snoops

Keep yourself safe with these online security tips, from anonymous browsing to hiding your digital tracks.

03/04/2016

How to make bad passwords better, and more hope for the future of authentication

How to make bad passwords better, and more hope for the future of authentication

We know passwords are a pain. We're not expecting miracles. But these tips can keep you from the dumbest mistakes. .

02/04/2016

Why stolen laptops still cause data breaches, and what's being done to stop them

Why stolen laptops still cause data breaches, and what's being done to stop them

It just takes one lost laptop to ruin a company's security. Some firms have solid plans for managing the risk. Does yours?

01/13/2016

Ransomware's latest threats: What to do about CryptoWall, Chimera and their ilk

Ransomware's latest threats: What to do about CryptoWall, Chimera and their ilk

In the past, if you had a backup of your files, you could avoid paying ransomware. Malware developers claimed to have added a new twist, threatening to publish the data of anyone who has not paid.

11/19/2015

Trust no one: How caller ID spoofing has ruined the simple phone call

Trust no one: How caller ID spoofing has ruined the simple phone call

Caller ID is easy to spoof and it’s leading to a host of real threats, from account recovery fraud to marketing scams to malicious pranks resulting in SWAT teams showing up at a victim's door.

08/04/2015

The 3-step plan to make your website harder to hack

The 3-step plan to make your website harder to hack

Online attackers are increasingly targeting websites to make a statement, send spam or flood someone else’s network. Protecting your online brand requires vigilance.

07/09/2015

NFC security: 3 ways to avoid being hacked

NFC security: 3 ways to avoid being hacked

More than a billion phones will be equipped with near-field communications technology in 2015, potentially opening up new vectors for attack.

06/26/2015

Load More