Security News & Reviews - Page 2
More Security News
Hackers are increasingly using Secure Sockets Layer encryption to conceal device infections, shroud data exfiltration and hide botnet communications, according to cloud security company Zscaler.
Marcus Hutchins, better known as MalwareTechBlog, was arrested by the FBI on his way home from the DefCon security conference in Las Vegas.
Cylance Protect Home Edition debuts delivering artificial intelligence powered malware detection capabilities proven in the enterprise, to the home office.
Seven years after acquiring the SSL/TLS certificate business from VeriSign, Symantec sells the business unit to DigiCert.
NEWS ANALYSIS: Artificial intelligence is taking on a bigger role in antimalware products. But it's not foolproof and its clear cyber-criminals will soon use AI to make their malware stealthier.
NEWS ANALYSIS: The first reports of the Amazon Echo and its ability to act as a stealthy listening device don’t seem alarming, but you need to think again.
A bi-partisan group of U.S. Senators proposes new Act to help make sure that IoT devices meet a set of basic security requirements that limit the risk of exploitation and attack.
DAILY VIDEO: Hackers demonstrate voting machine vulnerabilities at DefCon; new U.S. cyber-security legislation may help reassert the Fourth Amendment; Microsoft previews phone-friendly features in the Windows 10 Fall Creators Update; and there's more.
China is requiring registration of virtual private network technology and Russia is imposing an outright VPN ban. Here is what these restrictions mean for internet privacy and global commerce.
Because iPhone users aren't immune to attacks, security companies are aggressively building apps to protect the phone. Here are 10 of the best iPhone security apps available.
Researchers from Google, UCSD, NYU and Chainalysis analyzed the latest ransomware trends and explain why ransomware is not going away any time soon.
At the DefCon conference, security researchers detailed a set of 26 different vulnerabilities that impact millions of wireless gateways set up by internet service providers.