Topics
- All
- Security (124)
- Wi-Fi (44)
- Networking (41)
- Web Development (22)
- Malware (17)
- Broadband (16)
- Software (16)
- Smartphones (15)
- Browser (13)
- Collaboration (12)
- Mobility (11)
- Data Centers (10)
- Social Enterprise (9)
- It Employment (8)
- After Hours (6)
- Government (6)
- Cisco (5)
- Iphone (5)
- Printers (5)
- Servers (5)
- Android (4)
- Banking (4)
- Hardware (4)
- Privacy (4)
- Windows (4)
- Google Apps (3)
- Leadership (3)
- Project Management (3)
- Storage (3)
- Apps (2)
- Data Management (2)
- Fiber (2)
- Outsourcing (2)
- Patents (2)
- Software Development (2)
- Enterprise Software (1)
- Ios (1)
- It Policies (1)
- Laptops (1)
- Legal (1)
- Linux (1)
- Mobile Os (1)
- Pcs (1)
- Processors (1)
- Telcos (1)
- Travel Tech (1)
Content Types
About 445 results
-
Breach Detection Systems take aim at targeted persistent attacks
You've just been told to get a Breach Detection System in place. Where do you start? How about a buyer's guide created by an independent test facility?
-
New strain of ransomware evades detection by AV apps
Learn about a new type of ransomware that has the potential to snare many victims - and it's not even malware.
-
RiskRater: An IT-security test that no one fails
Three minutes. That's it. Take the RiskRater challenge. You could save yourself, your fellow employees, and family members from a costly Internet oops.
-
Why security metrics aren't helping prevent data loss
Security metrics are supposedly a way for upper management and IT departments to converse intelligently about in-house security programs. Why aren't the metrics working?
-
Android's very real 'Master Key' vulnerability
Android Master Key cryptography ensures applications are not tampered with. Michael P. Kassner interviews researchers who say the crypto process is severely flawed.
-
Why 'Nothing to Hide' misrepresents online privacy
A legal research professor explains to Michael P. Kassner why we should think long and hard before subscribing to the "Nothing to Hide" defense of surveillance and data-gathering.
-
Does using encryption make you a bigger target for the NSA?
Fact: The U. S. government is capturing data from its citizens. Fact: Encrypted data is of more interest to the U.S. government. Michael P. Kassner asks two experts, one legal, one...
-
Cheat sheet: What you need to know about 802.11ac
The newest wireless networking protocol is 802.11ac, due to be ratified sometime in 2013. Michael Kassner does the research and tells you what you need to know.
-
Convenience or security: You can't have both when it comes to Wi-Fi
Open Wi-Fi networks can be a godsend when you need them. Michael P. Kassner interviews a network-security expert who explains why bad guys like them even more.
-
Ignoring security advice from the pros: The IT-user disconnect
IT pros and the general population of users have seemingly different agendas when it comes to security. Michael P. Kassner interviews a noted researcher about the psychology of the...
-
BGP and Internet security: Is it better to be lucky or good?
Does "it's not a problem until it actually happens" apply to Internet security? Michael P. Kassner interviews a networking expert who's wondering about the same thing.
-
The anatomy of a phishing operation
There are far better things than being phished, like writing about how not to get phished. Michael P. Kassner reviews a research paper that provides amazing insight into a successf...
-
Virtualizing apps could be the bridge over the BYOD security gap
Allowing BYOD has unfavorable implications for both the company and employees. Michael P. Kassner explores what businesses are doing to mitigate the risk.
-
Aaron Swartz legacy lives on with New Yorker's Strongbox: How it works
Strongbox was Aaron Swartz's final project. Michael P. Kassner explains why The New Yorker requested a way to keep sources and their information secret.
-
Cloud-service contracts and data protection: Unintended consequences
There are things your cloud-service (Facebook, Amazon, Google, Dropbox, etc.) contracts aren't telling you. Michael P. Kassner interviews an attorney concerned about what's not bei...
-
Hackers: From innocent curiosity to illegal activity
Researchers asked why talented youth skilled in "computerese" evolve into criminal hackers. Michael P. Kassner explains their unexpected results.
-
BoxCryptor vs. DropSmack: The battle to secure Dropbox
Can DropSmack malware be stopped? Michael P. Kassner asks the creators of BoxCryptor if it is up to the task of securing the Dropbox file-synchronization service.
-
Understanding what motivates Chinese hackers
Michael P. Kassner, with the help of a noted academic and author, looks at what motivates Chinese hackers. It may not be what you think.
-
DropSmack: Using Dropbox to steal files and deliver malware
Michael P. Kassner interviews a digital forensic scientist who uses Dropbox to compromise targeted networks -- something the bad guys probably figured out as well.
-
Software-Defined Networking: How it affects network security
SDN technology is set to rewrite the book of networking. Michael P. Kassner looks into how SDN will improve security, and where it's vulnerable.
-
Security policies must address legal implications of BYOD
BYOD is controversial, particularly when it comes to security and privacy. Michael P. Kassner learns from an expert there is a legal can of worms as well.
-
Is uncovering digital vulnerabilities doing more harm than good?
A noted virtual-reality technologist and author views "security through obscurity" as the only true way security can exist. Michael P. Kassner looks at what this uniquely divergent...
-
Rootkit coders beware: Malwarebytes is in hot pursuit
Anti-malware heavy-hitter Malwarebytes is now laser-focused on eliminating rootkits. Michael P. Kassner asks the creators of MBAM how they approach this particular threat.
-
CISPA pits privacy against security: A closer look at the issues
The United States Congress is once again considering a bill that could forever change how we as individuals use the internet. Michael P. Kassner looks at what those changes are.
-
High-tech home security products: Who are they really helping?
Easy and convenient, wireless home security will keep your home safe. Michael P. Kassner looks at why bad guys might like them as well.
-
Redirection and decryption of mobile traffic: Is your browser a MitM?
By design, certain mobile web browsers send HTTPS-encrypted traffic to their home servers first. Michael Kassner finds out why, and what it means to each of us.
-
The end of antivirus software? Not so fast
The value of antivirus software is controversial. Michael P. Kassner asks an AV-testing expert why, and if it needs to be this way.
-
What's with Generation Y and online privacy?
Depending on whom you ask, members of Generation Y either have online privacy figured out, or they haven't a clue. Michael P. Kassner looks at who's right.
-
Guess what? Your favorite websites are more likely to serve malware than p0rn sites
A new report may change your perception of websites and malware. Michael P. Kassner ferrets out what Cisco is excited about.
-
Find out which mobile apps are stealing your identity
Mobile device malware is approaching exponential growth. Mobile apps are the vehicle of choice to deliver malware. Michael P. Kassner looks at our options.