All Blogs / Technology / Security / Popular

The best VPN services: Out 10 favorite vendors for protecting your privacy

Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.

The Problem with Cryptojacking

Jackers pick so many pockets at once that the cost per victim is actually minimal. What’s more, browser-based mining isn’t all bad. So what gives?

Democratic Rebuttal Memo: 5 Key Takeaways

House Democrats released a 10-page memo Saturday that shows just how misleading the original #ReleaseTheMemo campaign was.

The Rick Gates Plea, an Apple Watch Mess, and More Security News This Week

A Mueller probe plea, and Apple snafu, and more of the week's top security news.

Beware This Incredibly Silly—But Still Effective—Tax Scam

There are lots of tax scams out there, but this is the only one that pays you first.

What Rick Gates' Guilty Plea Means For Mueller’s Probe

Paul Manafort’s longtime deputy is cooperating with the special prosecutor, so we may soon have answers to these questions hovering around the Russia investigation.

Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency

Facebook is locking users out of their accounts until they download antivirus software that sometimes doesn't even work on their computers.

Apple changes Safari's cookie killer to fix Facebook's Like buttons

Apple has made its anti-tracking feature in Safari friendlier to social media.

Drupal patches critical CMS vulnerabilities

The bugs include incorrect code handling and access bypass security flaws.

US Border Patrol Hasn’t Validated E-Passport Data For Years

For over a decade, US Customs and Border Patrol has been unable to verify the cryptographic signatures on e-Passports, because they never installed the right software.

Overcoming the challenges: Back-up and storage for banks

Now is a good time for banks to think audit their back-up and storage to achieve both cost-savings and regulatory compliance.

US border officials haven't properly verified visitor passports for more than a decade

E-passports contain a cryptographic hash of a passport holders' details, designed to make it almost impossible to forge a travel document or steal someone's identity.

Hackers are selling legitimate code-signing certificates to evade malware detection

Code-signed apps are harder to detect by network security appliances, making it easier to sneak malware onto a vulnerable system. The downside? Certificates aren't cheap — and hackers usually are.

Vectra raises $36 million in AI-based threat detection push

The startup's Series D round highlights investor interest in AI cybersecurity systems.

UK Companies House strips company director info to combat identity theft

Company directors are being targeted en masse by identity fraudsters in the UK.

Hacking group used Facebook lures to trick victims into downloading Android spyware

At least three fake social media accounts posing as young women have encouraged victims into downloading highly invasive Android malware.

Lack of funding exposes US federal agencies to high data breach risks

Budget cuts and other restraints are hampering the government from effectively protecting itself against cyberattacks.

Copyright © 2015 Regator, LLC