It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Recent federal changes to password-strength guidelines echo the findings of research we’ve been doing. It’s time to think differently about what makes a password secure.
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
The Russian cyberthreat goes back over three decades, extends into the country’s educational systems and criminal worlds, and shows no signs of letting up.
Reports of North Korea’s capability of firing nuclear weapons are not the only serious threat to global security. North Korea has also become an aggressive cyber power.
Governments’ efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.