Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

20160225 stock mwc ericsson booth security locks
man with online security key

bunny computers desktop rabbit

Bash Bunny: Big hacks come in tiny packages

With new hardware hacking devices, it's absurdly easy to attack organizations through the USB port of any computer on a network

alert blur

Be more like Android: How Apple can fix iOS, CarPlay alerts

Android provides a model for Apple to use in iOS, and Apple has an option for CarPlay that should get wider use and be copied by Google

dark web hacker tablet malware

More Shadow Brokers fallout: DoublePulsar zero-day infects scores of Windows PCs

If you haven't installed the March Windows patch MS17-010, you need to hop to it

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

The son of Russian parliament member Valery Seleznev was sentenced to 27 years in prison for cybercrime-related offences

blockchain ecosystem

FAQ: What is blockchain and how can it help business?

The distributed ledger technology has enormous potential for firms that figure out how best to use it

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

security consultant cover

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services

ladybugs

Buggy open source components still dog dev teams

You can write the best code in the world, but if you use vulnerable libraries and frameworks, you're introducing serious security problems to your application

linksys wrt3200acm front 1200

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

security 2016 cybercrime

Cybercriminals prefer to chat over Skype

Cybercriminals don’t operate in the Dark Web only; they also rely on popular communications software such as Skype, WhatsApp, Jabber, and Signal

Oracle headquarters

Oracle fixes Struts and Shadow Brokers exploits in huge patch release

The quarterly Oracle patch update fixes a record 299 security vulnerabilities

securiy companies watch

Cybersecurity startups to watch

CBInsights names the up-and-coming companies, called ‘Cyber Defenders,' that are pioneering technology with the potential to transform cybersecurity

3147352

Trump's cybersecurity mystery: 90 days in, where's the plan?

An executive order was shelved without explanation, and a promised cybersecurity report hasn't materialized

shadowy figure reaching out of blurred background

Shadow Brokers lessons: First, don’t panic

If you're worried about zero-days and hacking tools but not outdated software and obsolete systems in your network, then you're doing security wrong

karm

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175

windows 10 hidden revealed

Fact or fiction? The truth about the Windows and Office hacks

In the last week, media reports suggested that Office and Windows users were at extreme risk of being hacked. Then the facts started coming in

superheroes superman wonderwoman captain america spiderman

9 superheroes for crack security teams

Want to beat the odds when meeting your next security challenge? Security teams work best when these roles are filled

Load More