About 74 results
-
Changes to Google Chrome and Chrome OS certificate handling
Beefed up requirements for RSA keys and changes to the way Google Chrome handles certificates will benefit Internet security for end users.
-
How facial recognition software can track you in the offline world
Patrick Lambert looks at the increased use of facial recognition software.
-
Researchers create nearly undetectable hardware backdoor
University of Massachusetts researchers have found a way to make hardware backdoors virtually undetectable.
-
What can IT do in the fight against government surveillance tactics?
Will the fight for privacy and freedom from government surveillance reach the grassroots of IT departments?
-
Are we heading for a 'cryptopocalypse'?
Patrick Lambert considers the current state of cryptography. Is it doomed to become obsolete as technology advances?
-
Resources for aspiring IT security pros
Are you contemplating in career in IT security? There are some basic resources to help you decide if it's right for you.
-
Freedom Hosting and 'torsploit': Troubles on the Onion router
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
-
Worst IT fail ever? US agency spends millions in useless security
A branch of the U.S. Commerce Department recently trashed perfectly good computers and wasted millions on a bogus malware infection. How did this happen?
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
-
New Android malware should be wake-up call for security admins
Security firm Kaspersky reported on a new malware threat that it calls the most sophisticated it has seen in targeting Android phones.
-
DARPA's Plan X and the future of the U.S. cyber defense infrastructure
Plan X sounds like a summer sci-fi movie, but it's actually one of DARPA's latest projects, aimed at improving the nation's defense of critical infrastructure targets.
-
Keeping your corporate social media accounts secure
Does your company have official social media accounts like Twitter or Facebook? How do you protect them from unauthorized access? Get a few tips here and take our poll on security ...
-
New McAfee patent hints at a more walled-off online world
A McAfee patent hints at content filtering at the user level in order to block sites that offer pirated content.
-
How to test Firefox 23 change on unsecured content before it happens
Mozilla announced that the next version of its browser, Firefox 23, will automatically block unsecured content on encrypted web pages. You can check how that change will affect you...
-
Securing Bitcoins: Barrage of attacks undermines value
Patrick Lambert looks into the tumultuous world of Bitcoins and recent threats to the virtual currency system.
-
DDoS strike on Spamhaus highlights need to close DNS open resolvers
Patrick Lambert breaks down the Spamhaus DDoS attack and some of the controversies that have ensued. What isn't up for debate -- fixing the open resolver flaw on DNS servers.
-
The security implications of 420,000 vulnerable hosts
Patrick Lambert presents a case of security findings that could get its researcher jail time. Is there such as thing as a "benevolent" botnet?
-
Stolen credit reports: What you can do to protect yourself
Patrick Lambert follows up on the stolen celebrity credit reports. You don't have to be famous to be at risk. What can individuals and businesses do for protection?
-
Making online payments safe from fraud: Conversion rate vs. security
Patrick Lambert looks at the vulnerable area of online payment fraud. Is there a way to make payment forms both convenient and secure?