About 74 results
-
Changes to Google Chrome and Chrome OS certificate handling
Beefed up requirements for RSA keys and changes to the way Google Chrome handles certificates will benefit Internet security for end users.
-
How facial recognition software can track you in the offline world
Patrick Lambert looks at the increased use of facial recognition software.
-
Researchers create nearly undetectable hardware backdoor
University of Massachusetts researchers have found a way to make hardware backdoors virtually undetectable.
-
What can IT do in the fight against government surveillance tactics?
Will the fight for privacy and freedom from government surveillance reach the grassroots of IT departments?
-
Are we heading for a 'cryptopocalypse'?
Patrick Lambert considers the current state of cryptography. Is it doomed to become obsolete as technology advances?
-
Resources for aspiring IT security pros
Are you contemplating in career in IT security? There are some basic resources to help you decide if it's right for you.
-
Freedom Hosting and 'torsploit': Troubles on the Onion router
The arrest of the Freedom Hosting CEO has set in motion a crisis for TOR and unleashed a java exploit designed to expose Freedom Hosting users.
-
Worst IT fail ever? US agency spends millions in useless security
A branch of the U.S. Commerce Department recently trashed perfectly good computers and wasted millions on a bogus malware infection. How did this happen?
-
Email encryption: Using PGP and S/MIME
For those worried about the security and privacy of email communications, encryption is one layer to add, but using encryption software isn't terribly user-friendly.
-
Everything you need to know about using TOR
TOR's anonymizing and encrypting features make it a very useful tool for privacy. Here's a quick look at the basics.
-
New Android malware should be wake-up call for security admins
Security firm Kaspersky reported on a new malware threat that it calls the most sophisticated it has seen in targeting Android phones.
-
DARPA's Plan X and the future of the U.S. cyber defense infrastructure
Plan X sounds like a summer sci-fi movie, but it's actually one of DARPA's latest projects, aimed at improving the nation's defense of critical infrastructure targets.
-
Keeping your corporate social media accounts secure
Does your company have official social media accounts like Twitter or Facebook? How do you protect them from unauthorized access? Get a few tips here and take our poll on security ...
-
New McAfee patent hints at a more walled-off online world
A McAfee patent hints at content filtering at the user level in order to block sites that offer pirated content.
-
How to test Firefox 23 change on unsecured content before it happens
Mozilla announced that the next version of its browser, Firefox 23, will automatically block unsecured content on encrypted web pages. You can check how that change will affect you...
-
Securing Bitcoins: Barrage of attacks undermines value
Patrick Lambert looks into the tumultuous world of Bitcoins and recent threats to the virtual currency system.
-
DDoS strike on Spamhaus highlights need to close DNS open resolvers
Patrick Lambert breaks down the Spamhaus DDoS attack and some of the controversies that have ensued. What isn't up for debate -- fixing the open resolver flaw on DNS servers.
-
The security implications of 420,000 vulnerable hosts
Patrick Lambert presents a case of security findings that could get its researcher jail time. Is there such as thing as a "benevolent" botnet?
-
Stolen credit reports: What you can do to protect yourself
Patrick Lambert follows up on the stolen celebrity credit reports. You don't have to be famous to be at risk. What can individuals and businesses do for protection?
-
Making online payments safe from fraud: Conversion rate vs. security
Patrick Lambert looks at the vulnerable area of online payment fraud. Is there a way to make payment forms both convenient and secure?
-
How passwords can wreck your two-factor authentication
Patrick Lambert shares a friend's experience with having his iCloud and Gmail accounts compromised. Make sure you know the gaps in two-factor authentication and app-specific passwo...
-
How to check and configure your browser plugins
Patrick Lambert offers some basic tips on how to check web plugins in four major browsers.
-
What the Mandiant report reveals about the future of cyber espionage
Mandiant reported on an overwhelming campaign of organized hacking from China against US and other Western targets. Cyber espionage is ramping up and security pros must be aware of...
-
Chinese cyberattacks and a Presidential executive order: What does it mean for you?
A wave of cyberattacks originating from China have been revealed and a new Presidential executive order pertaining to network security standards is in the works. Patrick Lambert ta...
-
Dotcom's new venture: Mega security or Mega problems?
Patrick Lambert looks at the hype and criticism surrounding Kim Dotcom's new website, Mega. Does it really offer perfect privacy through encryption?
-
The case against Aaron Swartz: Why we should be concerned
Patrick Lambert looks as the charges facing Internet activist Aaron Swartz before his death. Why were the penalties so severe and how easy would it be for others to get in the same...
-
New controversy on the effectiveness of antivirus software
Patrick Lambert looks at a recent report that tested antivirus and found detection rates "abysmal." But not everyone thinks the tests were fair.
-
Growing attack surfaces require new security model
Patrick Lambert describes the intelligence-based security model -- a response to new attack surfaces that don't fit into the standard perimeter-defense model.
-
Security Operations Center: Not just for huge enterprises
Patrick Lambert describes the role of the Security Operations Center (SOC) in an organization, and why its implementation is now in reach of smaller companies.
-
How to deal with DDoS extortions
Patrick Lambert looks at some of the ways you can protect your website from DDoS extortion threats.