IT Security

IT Security News

New Android Theft Protection Feature Updates: Smarter, Stronger (Tue, 27 Jan 2026)

>> Read More

HTTPS certificate industry phasing out less secure domain validation methods (Wed, 10 Dec 2025)

>> Read More

Further Hardening Android GPUs (Tue, 09 Dec 2025)

>> Read More

Architecting Security for Agentic Capabilities in Chrome (Mon, 08 Dec 2025)

>> Read More

Android expands pilot for in-call scam protection for financial apps (Wed, 03 Dec 2025)

>> Read More

Android Quick Share Support for AirDrop: A Secure Approach to Cross-Platform File Sharing (Thu, 20 Nov 2025)

>> Read More

Rust in Android: move fast and fix things (Thu, 13 Nov 2025)

>> Read More

How Android provides the most effective protection to keep you safe from mobile scams (Thu, 30 Oct 2025)

>> Read More

HTTPS by default (Tue, 28 Oct 2025)

>> Read More

Accelerating adoption of AI for cybersecurity at DEF CON 33 (Wed, 24 Sep 2025)

>> Read More

Supporting Rowhammer research to protect the DRAM ecosystem (Mon, 15 Sep 2025)

>> Read More

How Pixel and Android are bringing a new level of trust to your images with C2PA Content Credentials (Wed, 10 Sep 2025)

>> Read More

Android’s pKVM Becomes First Globally Certified Software to Achieve Prestigious SESIP Level 5 Security Certification (Tue, 12 Aug 2025)

>> Read More

Introducing OSS Rebuild: Open Source, Rebuilt to Last (Tue, 22 Jul 2025)

>> Read More

Advancing Protection in Chrome on Android (Tue, 08 Jul 2025)

>> Read More

Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store (Fri, 30 May 2025)

>> Read More

Tracking the Cost of Quantum Factoring (Fri, 23 May 2025)

>> Read More

What’s New in Android Security and Privacy in 2025 (Wed, 14 May 2025)

>> Read More

Advanced Protection: Google’s Strongest Security for Mobile Devices (Tue, 13 May 2025)

>> Read More

Using AI to stop tech support scams in Chrome (Thu, 08 May 2025)

>> Read More

Google announces Sec-Gemini v1, a new experimental cybersecurity model (Fri, 04 Apr 2025)

>> Read More

Taming the Wild West of ML: Practical Model Signing with Sigstore (Fri, 04 Apr 2025)

>> Read More

New security requirements adopted by HTTPS certificate industry (Thu, 27 Mar 2025)

>> Read More

Titan Security Keys now available in more countries (Wed, 26 Mar 2025)

>> Read More

Top Enterprise Encryption Products (Wed, 25 Nov 2020)
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
>> Read More

SASE: Securing the Network Edge (Tue, 24 Nov 2020)
Secure access service edge (SASE) is a combination of technologies that increase security at the edge of the network. Here's what you need to know.
>> Read More

Kaspersky vs. Bitdefender: EDR Solutions Compared (Tue, 24 Nov 2020)
Kaspersky and Bitdefender have similar antivirus software, but when it comes to EDR, the two are worlds apart. We compare features and pricing.
>> Read More

Best Antivirus Software for 2020 (Wed, 11 Nov 2020)
What is the best antivirus software? We use our own methodology to give you the answer, plus some tips on how to stay safe online.
>> Read More

Disk vs File Encryption: Which Is Best for You? (Sat, 07 Nov 2020)
Ideally you'd use both full-disk and file encryption to protect data at rest and data in motion. The good news is some vendors offer both.
>> Read More

Best Privileged Access Management (PAM) Software (Sat, 07 Nov 2020)
Protecting privileged accounts is one of the top security challenges for any organization. Here are the top privileged access management tools to help
>> Read More

Best IAM Software (Fri, 06 Nov 2020)
IAM Tools ensure secure system access to the right individuals at the right time. Compare Top IAM Solutions now.
>> Read More

Microsegmentation: The Core of Zero Trust Security (Sat, 24 Oct 2020)
Microsegmentation is a core technology for achieving zero trust security, the idea that no one should be trusted or given more access than needed.
>> Read More

Best User and Entity Behavior Analytics (UEBA) Tools (Fri, 23 Oct 2020)
Interested in user behavior analytics? Compare features & prices of the best UEBA tools on the market now.
>> Read More

VPN Security: How VPNs Work and How to Buy the Best One (Tue, 20 Oct 2020)
Virtual private networks (VPNs) come with different protocols and features, so choosing the best one requires some research. We outline your options.
>> Read More

Apple White Hat Hack Shows Value of Pen Testers (Fri, 16 Oct 2020)
An eye-opening exercise at Apple showed the value of human security testers in addition to tools - and the value of bug bounty programs too.
>> Read More

How to Improve SD-WAN Security (Sat, 10 Oct 2020)
Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps.
>> Read More

Top Threat Intelligence Platforms for 2020 (Sat, 10 Oct 2020)
We review the top vendors in threat intelligence, which has become a critical security tool as the volume and complexity of threat vectors grows.
>> Read More

Top CASB Security Vendors for 2020 (Fri, 09 Oct 2020)
CASB is the fastest-growing enterprise security market. Here are the top CASB solutions, plus buying and deployment advice.
>> Read More

Employees and Data Backup Top Cybersecurity Awareness Month Concerns (Thu, 01 Oct 2020)
October is cybersecurity awareness month, and securing employees and your data against emerging threats is a good place to start.
>> Read More

CrowdStrike vs Carbon Black: Top EDR Solutions Compared (Mon, 28 Sep 2020)
We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.
>> Read More

Top Zero Trust Security Solutions (Thu, 24 Sep 2020)
With solutions targeting access control and microsegmentation, security vendors are turning zero trust from a concept into products.
>> Read More

Securing Remote Workforce Is Top Security Priority: Gartner (Tue, 15 Sep 2020)
Gartner's top security project for 2020-2021 is secure access for the nearly 50% of employees who are suddenly working from home.
>> Read More

Top Vulnerability Management Software (Thu, 03 Sep 2020)
Vulnerability management software helps you find security issues before hackers do. Here's an in-depth look at the best vulnerability management tools
>> Read More

Best Enterprise Network Security Products (Tue, 04 Aug 2020)
Network security is central to IT security. Here are some of the best network security software and hardware products to protect vital data.
>> Read More

Latest Intelligence for October 2017 (Fri, 10 Nov 2017)
Symantec research shows users to be twice as likely to encounter threats through email as any other infection vector, and the spam rate declines slightly for the second month in a row. Read More
>> Read More

Sowbug: Cyber espionage group targets South American and Southeast Asian governments (Tue, 07 Nov 2017)
Group uses custom Felismus malware and has a particular interest in South American foreign policy. Read More
>> Read More

Ramnit worm: Still turning up in unlikely places (Fri, 27 Oct 2017)
Over 90 Ramnit-infected apps removed from Google Play. Read More
>> Read More

BadRabbit: New strain of ransomware hits Russia and Ukraine (Wed, 25 Oct 2017)
BadRabbit is self-propagating and has many similarities to the June 2017 Petya / NotPetya outbreak. Read More
>> Read More

Android malware on Google Play adds devices to botnet (Wed, 18 Oct 2017)
Symantec has found eight apps infected with the Sockbot malware on Google Play that can add compromised devices to a botnet and potentially perform DDoS attacks. Read More
>> Read More

We are updating news please visit us later…