6 hard truths security pros must learn to live with
Nearly every company in the world has thousands of vulnerabilities that hackers can easily exploit. For anyone working in IT, this is not a bombshell announcement. It’s business as usual. The reality...
View ArticleBe paranoid: 10 terrifying extreme hacks
Any device with a computer chip can be hacked, but not all hacks are created equal. In fact, in a world where tens of millions of computers are compromised by malware every year and nearly every...
View Article10 security technologies destined for the dustbin
Perhaps nothing, not even the weather, changes as fast as computer technology. With that brisk pace of progress comes a grave responsibility: securing it.Every wave of new tech, no matter how small or...
View Article10 reasons why phishing attacks are nastier than ever
Phishing emails have been the scourge of the computer world for decades, defeating even our best efforts to combat them. Most of us can easily spot them by their subject lines and delete without even...
View ArticleA free, almost foolproof way to check for malware
No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?In this video, you'll learn how to download and run Windows Sysinternals Process Explorer to test all...
View ArticleEffective IT security habits of highly secure companies
When you get paid to assess computer security practices, you get a lot of visibility into what does and doesn’t work across the corporate spectrum. I’ve been fortunate enough to do exactly that as a...
View Article11 signs your kid is hacking -- and what to do about it
I've shared a lot of security knowledge in my tenure as InfoWorld's Security Advisor. But what I've never shared before is that much of my initial computer security defense knowledge, which I turned...
View ArticleEssential certifications for smart security pros
If you’re pursuing a career in IT security, certifications can only help you. Certification-critics often say a certification means nothing, and acumen and experience are the true differentiators, but...
View Article17 essential tools to protect your online identity, privacy
Make no mistake: Professional and state-sponsored cybercriminals are trying to compromise your identity -- either at home, to steal your money; or at work, to steal your employer’s money, sensitive...
View ArticleSniff out and kick out Windows malware for free
No single antimalware engine can keep up with all the malware out there. But how about 57 of 'em?[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security...
View Article9 new hacks coming to get you
Securitywise, the internet of things is going as badly as most computer security experts predicted. In fact, most vendors don’t fully appreciate the potential threats IoT devices pose. Anything...
View ArticleFoiled! 15 tricks to hold off the hackers
Malicious hackers have outsize reputations. They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single...
View ArticleHas the quantum crypto break already happened?
Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.
View Article
More Pages to Explore .....