We talk a lot about computer security and data security here at Lifehacker, but you can never have too many reminders of the basics. Here, in a nutshell, are the security tips and habits every computer user should know. Consider it a quick way to audit your own security or help others you care about get the essentials…
Today the Department of Defense announced that it will soon require all of its contractors to report any major cybersecurity breaches. And if your first question is, why in the hell didn’t they require that before?, that’s a great question.
Hillary Clinton initially brushed off critics of her decision to use a private email server by saying it was more convenient. But now her “convenience” is derailing her presidential campaign. Yesterday, the former Secretary of State and current Democratic frontrunner agreed to turn over her personal server to the…
Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.
Today at massive security tech conference RSA in San Francisco, U.S. Secretary of Homeland Security Jeh Johnson told a packed audience that DHS would be forging alliances with Silicon Valley. He described plans to build an office here, in order to work directly with tech companies on key issues for the DHS.
It’s tempting to view security breaches as the products of mastermind hackers, but a massive report released today reveals the sad reality. Most of the time, breaches are the result of people falling for plain old trick emails.
Security researchers just found a way to hack into specially secured computer systems by sending messages using blasts of air. This is another example of how even the most walled-off systems can still get hacked.
China is finally admitting what we've known for years: Yes, it has cyber warfare units, and plenty of them.
Premera Blue Cross, a health-insurance company with millions of patients in the US, has just admitted that 11 million of its customers have been victims of a wide-ranging data breach. Stolen data includes Social Security numbers, bank account information, and clinical records. Oh crap.
Today from 1:30-2:30 eastern time, Bruce Schneier is here to answer your questions about surveillance, infosec, and private data. He's the author of Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World (read an excerpt).
A group of computer scientists have revealed a dangerous security flaw that could open up many phones and other machines to attack. The worst part is that the problem has its roots in a misguided U.S. government effort to prevent consumers from having access to strong encryption.
On Wednesday evening, the news began to break on Twitter. Computer security analysts had discovered something nefarious about a piece of advertising software called Superfish, which comes pre-installed on cheap Lenovo laptops like the Yoga 2. Superfish was leaving the laptops wide open to takeover by malicious…
Usually when you hear "sex" and "Trojan" in the same sentence, it means someone's being safe. Not so much in the most recent jack-off site hijacking: People checking out RedTube, one of the most popular porn sites, are in danger of identity theft. Hackers have infected the site's source code to redirect to malware…
So Shellshock is the newest vulnerability that may "break the internet." The last time they said that, it was about Heartbleed. Do I really need to be worried about all these bugs and vulnerabilities, or is this stuff tech companies need to care about? Can someone actually use these against me?
Skyfall, the latest Bond flick, wasn't just a fun movie — it also featured the only Bond villain who used evil cyberhacking as the main weapon in his arsenal. Of course movie hacking is rarely accurate (except for that shining moment when Trinity used nmap in The Matrix Reloaded), but it's still fun to pick apart…
When you're browsing from a public Wi-Fi connection-like at your favorite coffee shop-anyone on that network can snoop on what you're doing, with very few exceptions. So can the IT crew at your workplace. Today, we're going to walk through setting up an encrypted proxy server on your home computer so you can secure…
Oh, it is ON between Google and Microsoft. A Google security engineer in Switzerland warned Microsoft of a vulnerability in Windows XP, but after they didn't fix it within five days, he went public with the hacker's wet dream.
Microsoft really didn't like that a Google employee went public, telling the world the big G is swapping employees' computers from Windows to Chrome, OS X and Linux. They've responded in a particularly sarky way, calling it "ironic":