Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

dropbox logo sign
adobe san jose

pokemon go mexico

How to keep viral memes from spreading malware in your enterprise

Stop! Infected Pokemon Go, games and memes are spreading malware

OS X El Capitan installation

BitTorrent client is found distributing Mac-based malware

Months earlier, the Transmission BitTorrent client was found distributing Mac-based ransomware

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

Digital Key, security, encryption

New ransomware threat deletes files from Linux web servers

Attackers claim the files are first encrypted and uploaded to a server under their control

hollywood sign

Hollywood's 5 biggest hacking myths

Press Enter and watch the magic happen -- as if! Why does Hollywood's portrayal of hacking have to be so far off the mark?

book safe

45% off Dictionary Hidden Book Safe With Lock - Deal Alert

This very realistic looking dictionary conceals a locking solid steel safe for creatively hiding away your money, prescription bottles, jewelry, small electronics and more. Currently discounted 45%.

tools preventing data leaks 1

Review: Top tools for preventing data leaks

Comodo, Digital Guardian, and Forcepoint provide strong protection for sensitive data

eye spy

Dream on if you think spies will reveal their exploits

Governments will hide and exploit vulnerabilities as long as they can, even if that risks criminals getting their hands on them too

Firefox

Mozilla launches free website security scanning service

Observatory tool checks not for code vulnerabilities but for server configuration options and security mechanisms

checkmate chess

Real-life examples test whether you are prepared for a cyberattack

These tabletop exercises will update your response plan for live action

ios 9.3

Apple patches iOS security flaws found in spyware targeting activist

Government-hired hackers used three previously unknown vulnerabilities in Apple's iOS to target an activist in the United Arab Emirates

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco has released some fixed versions of its Adaptive Security Appliance firewalls, and more patches are expected

cloud security

Don't bring your bad security habits to the cloud

Not enough enterprises are using their cloud migrations to finally bring their data security up to snuff

cyber attack stock image

New collision attacks against triple-DES, Blowfish break HTTPS sessions

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

Apple security

The catch-22 with Apple security

A long, rocky relationship with Apple products and tech support culminates with a tangled up Apple ID -- and a yearning for Linux

video

Security Sessions: The pitfalls of security awareness training

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Bill Rosenthal, CEO of Logical Operations, about what's missing in many security awareness training programs that enterprises often deploy (if...

spotlight

A deeper look at business impact of a cyberattack

Hidden costs can amount to 90% of the total business impact on an organization, and will most likely be experienced two years or more after the event

elctrical plug shock

Side-channel power, the new security front

Power analysis may be a way to secure devices on the internet of things

Load More