The dangers of public IPs
Credit to Author: Ilja Shatilin| Date: Fri, 23 Nov 2018 12:01:17 +0000
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Ilja Shatilin| Date: Fri, 23 Nov 2018 12:01:17 +0000
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Read More
Credit to Author: Lily Hay Newman| Date: Wed, 21 Nov 2018 20:31:11 +0000
Researchers have discovered that the so-called Rowhammer technique works on “error-correcting code” memory, in what amounts to a serious escalation.
Read More
Credit to Author: JR Raphael| Date: Thu, 22 Nov 2018 04:00:00 -0800
Encryption may sound like a subject best left to hackers and tinfoil hat wearers, but don’t be fooled: It’s a critical part of contemporary life and something that’s important for everyone, especially business users, to understand. And one of the places where encryption is most relevant and misunderstood is in the realm of email.
If you’re using Gmail for electronic communication — be it for business, for personal use, or a combination of the two — it’s well worth your while to know how the service does and doesn’t secure your information and what steps you can take to make sure you’re getting the level of privacy you need.
Ready to dive in?

Credit to Author: Lily Hay Newman| Date: Tue, 20 Nov 2018 14:16:13 +0000
Two new reports show an uptick in sophisticated phishing attacks originating from—where else—Russia.
Read More
Credit to Author: Rebecca Heilweil| Date: Tue, 20 Nov 2018 11:00:00 +0000
The US Department of Defense’s Joint Non-Lethal Weapons Program is testing a new arsenal powered by lasers, plasma, chemical irritants, and more.
Read More
Credit to Author: Lily Hay Newman| Date: Tue, 20 Nov 2018 11:00:00 +0000
Cybercriminals are always looking to steal your credit card or even your identity. But it pays to be on extra high alert come Black Friday.
Read More
Credit to Author: Brian Barrett| Date: Mon, 19 Nov 2018 21:37:46 +0000
Cryptojacking officially knows no bounds.
Read More
Credit to Author: JR Raphael| Date: Tue, 20 Nov 2018 08:30:00 -0800
You might not know it from all the panic-inducing headlines out there, but Android is actually packed with powerful and practical security features. Some are activated by default and protecting you whether you realize it or not, while others are more out of the way but equally deserving of your attention.
So stop wasting your time worrying about the Android malware monster du jour and which security company is using it to scare you into an unnecessary subscription, and take a moment instead to look through these far more impactful Android security settings — starting with the core elements and moving from there into some more advanced and easily overlooked options.