Historically, Bitdefender has ranked as one of the best performing antivirus programs, and its Internet Security 2015 security suite ($60 for one year of protection on one PC) keeps it near the top of the heap. If you don't need the extra features--secure cloud storage or anti-theft protection for mobile devices--that are increasingly being offered as part of "total security" packages, then this suite will ably secure your PC with little to no input from you.
Thanks to the fallout from the revelations about the U.S. government's surveillance tactics, people are starting to take interest in using encryption tools for keeping email, files, and instant messaging private. Just recently, Yahoo said it would build encryption into Yahoo Mail and Google is doing something similar with Gmail.
The wireless Matias Secure Pro keyboard's number-one claim to fame is its 128-bit AES encryption. I'll get into that later. My favorite feature is that it's quiet. You'd hardly know this was a mechanical keyboard from the sound it makes. It's close to the volume level of a typical membrane keyboard, if a little sharper or clickier at times. You could use this board in any office or in a bedroom without disturbing a soul.
Android security suites generally have a lot of tricks up their sleeves, but Lookout Premium has taken it up a notch with anti-theft and recovery features. The program's variety of email alert settings is without peer. That said, the latest results from AV-TEST pegged Lookout as below par in malware detection and perhaps too aggressive in picking out suspect software.
Editor's note: The following review is part of Macworld's GemFest 2014. Every day (except weekends) from July until September, the Macworld staff will use the Mac Gems blog to briefly cover a standout free, low-cost, or great-value program. You can view a list of this year's apps, updated daily, on our handy GemFest chart, and you can visit the Mac Gems homepage for past Mac Gems reviews.
If you're looking for secure storage with lots of capacity for your home or workplace, Apricorn's Aegis Padlock DT is a good place to start the search. This 3.5-inch external hard drive is relatively affordable--for the secure storage market, that is. It's FIPS 140-2 certified and can be administered via an on-board keypad. That makes it more versatile than solutions that rely on client software for encryption and access.
Ashampoo's slogan is "We Make Software!"--and they mean it. The German software company is best known for its wealth of PC tune-up tools, which include a Windows optimizer, a registry cleaner, and an Internet accelerator. Now, Ashampoo also makes a security suite--sort of.
If you read our recent Freedome review, you know the reasons you might want to utilize a VPN (Virtual Private Network): privacy and spoofing your location. Freedome proved good at both, but VyprVPN from Golden Frog is in another class when it comes to location spoofing, with servers in 38 separate countries, including a small-fry like Luxemborg (sorry Luxemborgers...). You can pretend you're from almost anywhere with VyperVPN.
Time to take a visit to the Mac App Store's Updates tab, because OS X 10.9.3 has arrived, along with iTunes 11.2. The latest update to Apple's desktop operating system brings a number of bug fixes and improvements, while the new version of iTunes adds some enhancements for podcast listeners.
Drive imaging is one of those essential tools that is simple in principle yet can be complex in implementation.
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
With the mobile, connect-to-any-Wi-Fi-you-can-find lifestyle comes a certain amount of risk. It's not a simple deal, but unscrupulous types can hack unencrypted communications between your mobile device and Wi-Fi hotspot or routers. That's where F-Secure's Freedome--a combination of VPN (Virtual Private Network) service and malware protection for your iOS or Android device--steps in.
In the past couple years, apps that store secure data on a Mac or iOS device have become a pretty common sight; the need for some kind of "secure vault" where you can stash everything from passwords to credit card numbers has become so prevalent, in fact, that Apple even built the ability to do so right into OS X Mavericks with iCloud Keychain.
Chances are, when you need a security suite you first look to the big players: Symantec, Kaspersky, McAfee, or Trend Micro. But Check Point's ZoneAlarm Extreme Security is a full suite that offers protection on a par with those brands: In independent tests, ZoneAlarm managed almost-perfect protection, excellent performance, and just one false positive.
Network security is a topic that makes many people's eyes glaze over, and I can't blame them. We all rationally know that we should make sure our information is secure, but for most of us actually doing so is probably one step below flossing, or keeping track of our receipts.
With all the NSA hooplah this past year, and mounting concerns over user security, it's not surprising that you might want to shield certain of your files from prying eyes. You can use any of a number of overly complicated solutions, including Terminal commands and expensive consultants, but software developer MacPaw wants to make it a bit easier for the average person with Hider 2 (Mac App Store link). Hider 2's normal price is $20, but MacPaw is currently offering the app for an introductory price of $10.
Password Safe has an excellent pedigree: The original version of this password database was designed by security expert Bruce Schneier. The current version follows the design path laid down in the early 2000s--and that's a problem, because user needs have moved on.
Small business owners often believe their companies are immune to cybercrime. After all, why would criminals bother with guppies when they can net a whale, right? Wrong. Hackers are increasingly targeting small businesses, because they typically lack the security monitoring and management capabilities of larger companies.
Sign up now »
Deep Discovery is uniquely designed for threat detection, real-time intelligence, adaptive protection, and rapid response to combat targeted attacks and Advanced Persistent Threats (APTs).
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.