7 Reasons To Love Passwords
Passwords are often ridiculed, but there are some reasons they should be your nearest and dearest authentication factor.
Ransomware: 5 Threats To Watch
Cyber criminals have kicked it up a notch with nasty malware that locks you out of your machine and holds it for ransom.
Hacker Movies We Love & Hate
Check out Dark Reading community members' favorite hacker movie hits and misses. Then add your picks in the comments section.
9 Notorious Hackers Of 2013
This year's hacking hall of shame includes members of Anonymous and the Blackhole cybercrime gang, plus state-sponsored groups.
Iris Scans: Security Technology In Action
Iris-based security scans are the stuff of sci-fi movies, but NIST research shows how the technology can now be used in the real world to reliably identify individuals.
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.
Slide Show: 10 Password Database Fails
Evernote's most recent password breach is the same refrain from a song the industry has been singing for a while -- check out some of the worst password cache compromises
Spy Tech: 10 CIA-Backed Investments
Check out some of the latest technologies to win funding from In-Q-Tel, the venture investment arm of the CIA and other intelligence agencies. That's the first step toward use by agents and analysts.
Who Is Hacking U.S. Banks? 8 Facts
Hackers have labeled the bank website disruptions as grassroots-level reprisal for an anti-Islamic film. But is the Iranian government really backing the attacks?
14 Amazing DARPA Technologies On Tap
Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Slide Show: 10 Free Database Security Tools
While many database protection suites are an expensive proposition, there are a number of free tools available to organizations seeking cost-effective ways to begin securing their databases
Facebook's History: From Dorm To IPO Darling
Facebook's IPO brings the world's most popular social network into Wall Street's big league. After a wild ride, Facebook's future depends on profiting from an increasingly mobile user base.
Who Is Anonymous: 10 Key Facts
Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.
7 Tools To Tighten Healthcare Data Security
Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
Ten Big Breaches In 2011
No one was immune: not social networks, not financial institutions, and not even security firms