Security | News, how-tos, features, reviews, and videos
Crypto experts agree it's time to ditch SHA-1 if you haven't already, but also to know where the real risks are
No one really knows what website and mobile app information got leaked where, but here's what IT should consider doing to be safe
SHA-1 in digital certificates and cryptographic keys hasn't been safe for years. With the world's first successful collision attack, the clock has run out for the hash function
The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou
The program's creator asks for payments but doesn't have the encryption key to unlock victims' files
The IT-compiled web application provides users a personalized list of security recommendations for their own computers, smartphones, and tablets
Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways
If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do
What we learned at the RSA Conference: The security industry is failing its task of keeping users and information safe because it refuses to play well with others
Hackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls