VPNs Fail Critical Security Tests

A VPN is meant to ensure the privacy of your communications through strong encryption, but new tests suggest that the most popular VPN services have critical security flaws.


Ask Lifehacker: How Can I Make My Company Store Passwords More Securely?

Hi Lifehacker, it just struck me that my workplace is as bad as Sony when it comes to storing passwords, but I can’t think of an easy-to-use secure alternative that they would adopt. What do you recommend for this issue for SMEs? Thanks, Unsecured


Why We Need To Take A 'Spartacus' Approach To Data Encryption

Encryption is still the most effective way to achieve data security from outside threats. However, it can also throw up a red flag that your data is worth stealing — and could even convince government agencies that you have something to hide. According to encryption expert and Silent Circle founder Phil Zimmermann, the solution is for businesses to band together, Spartacus style.


This Video Explains Everything You Need To Know About DDoS Attacks

Distributed denial of service (DDoS) attacks can cause problems for a lot of people, whether they’re the intended victim or not. This video explains how they work and how they can affect you.


How Delayed Detonation Malware Works

Having spent quite a bit of time at security events over the last few years, it’s not often I hear about a new form of malware or attack. But during a media briefing with Cisco’s VP for managed security services Tom Powledge, we learned about an emerging threat –- delayed detonation malware.


How Windows 10 Update And The New 'Patch Tuesday' Will Work

There are a lot of vague announcements and a myriad of conclusions from security experts and the media regarding recent Microsoft news about the upcoming release of Windows 10 and the introduction of Windows Update for Business. What’s actually happening?


Why Using Sleep Mode On Your Mac Leaves It Vulnerable To Attacks

A security researcher has uncovered a flaw in Mac computers that could allow the installation of rootkit malware. The simple fix for now? Don’t use sleep mode on your Mac.


Why You Need A Risk Policy For Open Source

You may well be reading this article at your desk at work or, perhaps, at home. You may be reading it on a browser based on open source. Your company may well have chosen the browser because it is free.


How Logjam Busts Web Site Encryption

There’s a hole in the protection surrounding some of the internet’s supposedly secure websites. A group of researchers has discovered that cyber criminals and other hackers can attack websites that use the “https” security encryption using a method known as “Logjam”. This attack, which is thought to work on around 8% of the top one million websites, allows hackers to see important information that should be protected, such as payment details or private communication.


'Mean Time Before CEO Apologises' Is The Ultimate Security Metric

There are lots of metrics for measuring security readiness and response, but we think this one’s hard to beat: the time between when a security incident occurs at a major company and when the CEO is forced to make a grovelling public apology.