Security | News, how-tos, features, reviews, and videos
Follow these steps to enable SSL connections and properly configure user privileges to keep your database secure
Code vulnerabilities and other entry points for hackers exist in your systems. Why not use hackers to help find and fix them?
How to create a high-performance, highly available, and flexible access control system using binary data and bitwise operators in Redis
Like it or not, your PC is susceptible to malware. These videos will teach you how to locate the bad stuff, then remove it from your system
Watch a PC intentionally get infected with the Locky ransomware, then learn how to get your files back without having to pay the ransom
Android smartphone and tablets can now safely join iPhones and iPads in your mobile portfolio
Encryption is a vital self-defense tool, so here's how to enable it on all your devices and computers running the major OSes
How to scan every running process on your system for malware in seconds, without installing antimalware software
Recently acquired by Twilio, Authy makes it easy to send codes to users' mobile phones for that extra measure of log-in security
Does Microsoft's new OS really endanger your privacy and security? We examine the four top concerns about Windows 10 -- and what you can do about them