Security news, trends, analysis and practical advice

Wi-Fi sign

Illustration: safety net, disaster recovery, emergency rescue

5 things you should know about cyber insurance

As more companies step in to offer insurance coverage against a broad range of cyber losses, we break down five points that organizations should keep in mind as they consider their options.

irs stoplight

IRS cut its cybersecurity staff by 11% over four years

As headcount is falling, cybersecurity spending at the agency is increasing.

yahoo new mail

Judge OKs class-action status for email-scanning lawsuit against Yahoo

A lawsuit that alleges Yahoo's email scanning practices are illegal can proceed as a class action complaint, a development that will shine the spotlight on the Yahoo Mail use of messages' content for advertising purposes.

data breach thinkstock

Data breach costs now average $154 per record

According to a report released by IBM and the Ponemon Institute, the per-record cost of a data breach reached $154 this year, up 12 percent from $145 in 2014.


Senate to return early to D.C for debate on phone dragnet law

The U.S. Senate will return early from a week-long recess in a last-ditch effort to extend provisions of the Patriot Act.

Being stalked

Use Facebook Messenger? Marauders Map app can pinpoint your location to within 3 feet

Stalkers will likely rejoice as a new app can help them do more than creep on Facebook friends as it can pinpoint the precise location of non-friends if they use Messenger to post to the same group and the sender hasn't disabled...

email security

Best practices for email security

6 ways to tighten up email policies and improve network security.

computer security stock image

Ads for MacKeeper refunds will run on Facebook

MacKeeper's original developer is offering $2 million to settle a class-action suit.

Thieves stole data on 100,000 taxpayers via IRS app

They first dug up Social Security data, dates of birth and street addresses through other sources.

apple pay

Apple Pay’s weakest link

The mobile payment service remains solid, as long as banks beef up their card-registration procedures. But what weakness will fraudsters take advantage of next?


Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's recently published patent for Internet-connected toys, which have microphones, cameras, speakers and motors, have sparked privacy concerns; the 'creepy' anthropomorphic devices might look like a doll or teddy bear; but some...

Large-scale attack uses browsers to hijack routers

Cybercriminals have devised a Web-based attack tool to hijack routers when users visit compromised websites or view malicious advertisements.

security criminals

Full Adult Friend Finder database offered up for $17k worth of bitcoins

An unredacted version of a database that may have been stolen from Adult Friend Finder is being offered for sale for 70 bitcoins, or around $17,000.

nsa national security agency

Senate blocks NSA surveillance reform bill

The U.S. Senate voted early Saturday to block the USA Freedom Act, legislation that aimed to put an end to the bulk collection of telephone records by the NSA.

Patriot Act protestors

Senate leader pushes to extend NSA phone dragnet

The U.S. Senate was deadlocked Friday over whether to extend authorization for the National Security Agency's massive collection of domestic telephone records, with Majority Leader Mitch McConnell insisting the program should continue...

machine learning code brain matrix data

Your brain as a biometric marker

We haven't found that perfect combo of infallibility and convenience in a biometric-based security system. But research shows we are getting closer.

Android apps

Even a factory reset in Android phones leaves user data behind

Resetting an Android phone to its factory state before getting rid of it often fails to properly wipe all sensitive user data.


As smartwatches gain traction, personal data privacy worries mount

Growing interest in smartwatches has sparked user privacy concerns as companies find ways to collect and use personal health, location and purchasing data found on the wearable devices of their customers and workers.

Load More