Topics
Content Types
About 14 results
-
New strain of ransomware evades detection by AV apps
Learn about a new type of ransomware that has the potential to snare many victims - and it's not even malware.
-
Chrome extensions are vulnerable: Advantage, bad guys
Chrome may be secure, but if the extensions aren't, it doesn't matter. Michael Kassner asks the experts why extensions are vulnerable and what's being done about it.
-
Behavioral marketing: Why Johnny can't opt-out
Behavioral advertising can be intimidating if privacy is one of your concerns. Thankfully, we're able to opt-out of being tracked. Or are we? Michael Kassner investigates opt-out t...
-
Do Not Track functionality: How it works
Internet privacy is very much in the news. Everything from new technology to government regulation is being promoted. What does that mean to us?
-
Invincea Document Protection: Preventing PDF exploits
Exploiting Adobe PDF files is currently the method of choice for installing malware on a computer. Michael Kassner reports on a new countermeasure that opens PDFs in a separate vir...
-
WinPatrol Cloud Edition leverages collective intelligence
MVP Bill Pytlovany created his security utility called WinPatrol 11 years ago. It's time to take another look at the app, because the Cloud Edition makes it even better.
-
Invincea Browser Protection: Using the power of virtualization to combat malware
Invincea is a small Virginia company that may have found a solution that protects computers from web-borne threats, and it's transparent to the user. That's a win-win situation.
-
Five tips for testing Web browser security
Drive-by downloads have made Web browsers the malware-delivery vehicle of choice. Here are five test sites that will help keep malware in check.
-
Google Chrome: The new breed of Web browser
The Chrome development team focused on three things; stability, speed, and security. Chrome is stable and fast, but how do we know if it's secure?
-
Chrome extensions: Potential cracks in the armor?
Chrome became my Web browser of choice, after learning contestants at this year's Pwn2Own felt it was too difficult to exploit. Yet, bad guys don't have to abide by the same rules.