Security

Security | News, how-tos, features, reviews, and videos

patch on top of Windows logo
TradeLens supply chain shipping blockchain

face superimposed on keyboard privacy hacker

How to protect your privacy in Windows 10

Worried about privacy issues in Windows 10? Here's what you can do.

Throwback Thursday: How did...er, DIDN'T he do that?

It's 1977, and this company decides its newly constructed data center needs a state-of-the-art system to provide physical security -- which doesn't quite work as planned.

Windows logo overlaying hand with band-aid patch

Patch Tuesday fallout: Bad docs, but so far no major problems

In spite of an enormous number of erroneous “known issues” warnings, this month’s crop of Windows and Office patches seems to fix most of the bugs in last month’s patches.

abstract blockchain representation of blocks and nodes

Blockchain phase 2: Will it scale?

As blockchain grows in popularity, so does the conundrum of how to scale it while maintaining or boosting performance so it can compete with today's transaction networks.

Android 9 Pie Lockdown Mode

A hidden Android Pie security setting everyone should enable

Give yourself added peace of mind with this powerful but buried security option in Google's Android 9 Pie release.

hand at keyboard with Windows logo

Patch Tuesday’s coming: Block Windows Update and pray we don’t get fooled again

Another Patch Tuesday is approaching. To avoid the bug chaos that could happen -- like we saw last month -- make sure Automatic Update for Windows is turned off.

template c100.00 00 44 13.still001
video

Blue Team Village, DEF CON 2018 | Salted Hash Ep 43

Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.

Windows logo overlaying hand with band-aid patch

A word to the wise: Skip Microsoft’s July patches

Microsoft's Windows and Office patches for July are still a mess. Perhaps August will be better.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

Grand Theft IT? Not quite

This company's sales team is getting new laptops, and they're being upgraded 80 at a time -- but that isn't the only reason not much is lost when thieves break in.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

tsmc in tainan science park

TSMC's iPhone chip attack is a wake-up call for enterprise security

TSMC's WannaCry-related ransomware attack should be a wake-up call for enterprises at every level of connected manufacturing that they are already under attack.

An armored knight armor with halo and wings holds a shield, layered in Microsoft brand colors.

How Microsoft became tech’s good guy

Even if it’s doing so out of self-interest, the company has been acting as a force for good.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

broken window with windows logo in clouds

Windows updaters express frustrations. Microsoft responds.

Earlier this week, Susan Bradley published a comprehensive look at the results of her survey of nearly 2,000 Windows updaters. Now, Microsoft has officially weighed in.

sale 15179 primary image

Brush up on your IT skills with this comprehensive CompTIA training bundle

This bundle covers content ranging from entry-level A+ and Network+ certifications training all the way up to advanced certifications like CySA+ and CASP, so there’s something here for everyone.

dark web hacker tablet malware

Apple users ‘most appealing’ to cybercriminals' online scams

Apple’s platforms may be the most secure, but this is driving cybercriminals to more devious ways to undermine iOS and Mac security. Enterprise and consumer users must be aware.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

Load More