Use this two-part test to convince romance scam victims that their “true love” is a fraud.
Stories by Roger A. Grimes
This veteran security pro feels more secure now that he's using a password manager, but there are still risks.
If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.
Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.
China has stolen US information without using secretly embedded hardware, so why would it jeopardise its massive semiconductor industry?
Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.
Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.
Quantum computers advance mean we might have only a few years before they can break all public key encryption. The day when every secret is known is near.
Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit
Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.
These scams rely on tricking consumers into believing they are interacting with a trusted vendor. Here’s how vendors can prevent the scams.
Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack
Whether a hacker uses a computer exploit or malware, their motivations are the same. Understanding why and how hackers hack is key to your defense.
Choose a security event information management (SEIM) vendor that helps you focus on only the security event data that needs to be investigated.
Some vendors who claim their products use artificial intelligence or machine learning technology are really using rules-based engines. Here's how to spot the lie.