With Internet Explorer 9 and Firefox 4 in stable betas, which is better at protecting your data, your privacy, and your desktop?
Columnist Kenneth van Wyck takes Windows 7 and Snow Leopard out for a spin to see which operating system offers the best security.
A security expert provides a point-by-point comparison of today's two leading browsers.
Tips on protecting yourself and your PC as you use Facebook, Twitter and other social networking sites.
Should mobile carriers push out updated software to customers regardless of choice, or is it safer to have the users request the updates?
The Open Web Application Security Project (OWASP) is a non-profit thats aiding Web developers to avoid major security problems in coding. Plus: a Top 10 list of the most common Web security problems.
A noted security expert talks about the larger meaning of the recently released list of top programming errors.
Just how safe is it to download and use, say, an application that can access an Amazon account and make purchases with one click? (Gulp!)
An insiders guide to browser and password safety as you travel the Internet searching for bargains.
Security experts conduct countless pen tests to secure application systems, yet several problems limit their effectiveness.
When it comes to our computers, the classic principle of innocent until proven guilty is simply too dangerous.
Logging on using your mobile device allows hackers to steal your password unless you take basic precautions.
Have you heard about the security conference where the organizers inadvertently distributed a virus-infected USB stick to the attendees?
Each of the three browsers has strengths in malware protection, but its their weaknesses that are the most worrisome.
A security expert revisits an earlier examination he made of the relative security of Mac Tiger and Windows XP.
A security experts hope the industry can keep that momentum going and start really paying attention to the security of our software, and not just try to retro-engineer security through largely superficial bolt-on products.
In some situations -- like 30,000 feet in the air -- an ironclad firewall is incredibly important.
As the new year dawns, some pressing security threats deserve more attention. For example, Cross Site Request Forgery (CSRF) is remarkably wide spread.
Examining the two platforms on a feature by feature basis, the Android appears far more promising in guarding against hackers.
Lets hope other mobile vendors paid close attention to Apples big blunder but dont ask me to bet on it.
A security expert examines the relative security of the two programs on a point-by-point basis.
Based on a point-by-point security comparison, a security expert lays out his opinion.
A timeless lesson applies to the iPhone: If something is under the control of a user, we must assume it will be tampered with.
They appear to be valid - though its hard to say. But all they do is sow confusion. What are they thinking?
Sure, it will be pretty. But hackers are waiting for it just as eagerly as the gadget geeks.
- Dec 2010
- Feb 2010
- Jul 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Sep 2008
- May 2008
- Mar 2008
- Feb 2008
- Jan 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- May 2005
- Apr 2005
- Mar 2005
- Jan 2005
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?