Articles about Security
-
Snowden blasts US justice department, says Petraeus leaks 'far more highly classified' than his own
In a recent interview with Yahoo's Katie Couric, former NSA contractor Edward Snowden spoke about how he believes justice in the US is 'two-tiered.'
-
How to gain encrypted email on the Chromebook
If you've been waiting for encrypted email to arrive on Chrome OS, thanks to Android apps, it is now ready for prime time. Jack Wallen shows to make this so.
-
Android Security Bulletin November 2016: What you need to know
The Android Mediaserver is back in the critical column for vulnerabilities. Get the highlights of the November 2016 bulletin.
-
How to use PowerShell to investigate Windows Defender's malware signature definitions database
What malware does Windows Defender recognize? Learn how to use PowerShell's Defender cmdlets to peek inside the malware signature definitions database.
-
Poll: What new cybersecurity trends will dominate 2017?
In 2016 ransomware, phishing, and IoT attacks pummeled business and consumers alike. What cybersecurity trends will emerge in 2017? Take our survey to share your opinion about emerging hacker trends.
-
Eye and fingerprint scanners in cars will double by 2021, report says
The market for biometric vehicle access systems is expected to reach $855 million by 2021. Learn how it could impact professionals and businesses.
-
-
Five essential cybersecurity audiobooks
A curated list of cybersecurity audiobooks to help you better understand the history of computing, who hacks and why, and the future of cyber-defense.
-
How Harvard University secures its cloud network with Amazon
Recently, at the AWS re:Invent conference, Harvard's manager of cloud architecture detailed the main investments that the university made in order to secure its cloud.
-
iCalendar users: Noticing spam invitations? Here's what's happening and how to fix it
The problem is unique to iCalendar users and it stems from Apple's desire to make things easier for us. Luckily there is a way to get rid of those random, often unintelligible, invites.
-
Infographic: Small business is vulnerable to cyberattack
According to a survey by data firm Carbonite 74% of small business owners fear Washington politicians are not doing enough to protect companies against cyberattack.
-
Privacy advocates rejoice: A new way to anonymize data might actually work
Researchers at Radboud University have developed an anonymization process using polymorphic encryption and pseudonymisation. Applications may include securing healthcare and IoT data.
-
Why firewalls are not recommended for securing SCADA systems
SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG.
-
How to add more entropy to improve cryptographic randomness on Linux
If you have Linux servers that depend upon encryption, you owe it to yourself to beef up the system entropy. Here's how to do so with haveged.
-
The state of malware: 4 big takeaways from AV-TEST's 2016 report
The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe.
-
Cybersecurity in President Trump's America: The first 100 days
It could take months to know what the Trump administration's cybersecurity policy will be. Cyber-defense experts weigh in with advice and best practices for securing your company today.
Free Newsletters, In your Inbox
Topic Contributors
-
Michael Kassner
Information is my field...Writing is my passion...Coupling the two is my mission.
You can also find Michael Kassner on and Google+
-
Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic and Linux.com. He’s an avid promoter of open source and the voice of The Android Expert. For more news about Jack Wallen, visit his website jackwallen.com.










