How greed could destroy the ransomware racket
Ransomware scam artists have a good thing going. They infect some computers and inflict a distasteful—but ultimately logical—choice on the victims: Pay up or lose your data. Ransoms can be an...
View ArticleThis is what your messaging app needs to be truly secure
You may love your messaging app, but your messaging app may not love your privacy and security. WhatsApp, arguably the most popular messaging app in the world with a billion users, made a significant...
View ArticlePhone hacking: What the FBI won't reveal could hurt users, experts argue
WASHINGTON—We already know that law enforcement agencies can hack our phones. But we don’t know what they find, how they find it, or even who helps them discover the information. Top cybersecurity...
View ArticleHow the new age of antivirus software will protect your PC
Antivirus software ain't what it used to be. The sneaky, sophisticated security threats your PC faces now have gone far beyond what traditional software can do. The future of protecting your PC will...
View ArticleMac malware: Coming soon to a computer near you
Computer security is science, yet it sure seems to traffic in enough beliefs to make it seem like a collection of warring cults. And no matter which infosec church you’re most swayed by, you’re...
View ArticlePassword managers: The good, the bad, and the ugly
In a world where we’re being told to change our passwords every five minutes thanks to the latest massive breach, it’s hard to imagine life without a password manager. Though now that these killer...
View ArticleCybersecurity insurance: A new answer to online crime
Cybersecurity insurance has been gaining prominence over the past couple years across a variety of sectors. Now it’s poised to be the next big thing for consumers.For a barometer, look no further than...
View ArticleKeyloggers: Beware this hidden threat
The American television series Mr. Robot introduces its viewers to a lot of hacking attacks, techniques, and tools. Most of it is based on actual methods and hardware, even if it is presented as far...
View ArticleMac malware: Coming soon to a computer near you
Computer security is science, yet it sure seems to traffic in enough beliefs to make it seem like a collection of warring cults. And no matter which infosec church you’re most swayed by, you’re...
View ArticlePassword managers: The good, the bad, and the ugly
In a world where we’re being told to change our passwords every five minutes thanks to the latest massive breach, it’s hard to imagine life without a password manager. Though now that these killer...
View ArticleCybersecurity insurance: A new answer to online crime
Cybersecurity insurance has been gaining prominence over the past couple years across a variety of sectors. Now it’s poised to be the next big thing for consumers.For a barometer, look no further than...
View ArticleKeyloggers: Beware this hidden threat
The American television series Mr. Robot introduces its viewers to a lot of hacking attacks, techniques, and tools. Most of it is based on actual methods and hardware, even if it is presented as far...
View Article