Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

dark web hacker tablet malware
Legislation of privacy security keyboard law legal gavel court ruling

blockchain ecosystem

FAQ: What is blockchain and how can it help business?

The distributed ledger technology has enormous potential for firms that figure out how best to use it

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

security consultant cover

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services

ladybugs

Buggy open source components still dog dev teams

You can write the best code in the world, but if you use vulnerable libraries and frameworks, you're introducing serious security problems to your application

linksys wrt3200acm front 1200

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

security 2016 cybercrime

Cybercriminals prefer to chat over Skype

Cybercriminals don’t operate in the Dark Web only; they also rely on popular communications software such as Skype, WhatsApp, Jabber, and Signal

Oracle headquarters

Oracle fixes Struts and Shadow Brokers exploits in huge patch release

The quarterly Oracle patch update fixes a record 299 security vulnerabilities

securiy companies watch

Cybersecurity startups to watch

CBInsights names the up-and-coming companies, called ‘Cyber Defenders,' that are pioneering technology with the potential to transform cybersecurity

3147352

Trump's cybersecurity mystery: 90 days in, where's the plan?

An executive order was shelved without explanation, and a promised cybersecurity report hasn't materialized

shadowy figure reaching out of blurred background

Shadow Brokers lessons: First, don’t panic

If you're worried about zero-days and hacking tools but not outdated software and obsolete systems in your network, then you're doing security wrong

karm

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals can engage in more ransomware attacks, thanks to a new variant called Karmen that hackers can buy on the black market for $175

windows 10 hidden revealed

Fact or fiction? The truth about the Windows and Office hacks

In the last week, media reports suggested that Office and Windows users were at extreme risk of being hacked. Then the facts started coming in

superheroes superman wonderwoman captain america spiderman

9 superheroes for crack security teams

Want to beat the odds when meeting your next security challenge? Security teams work best when these roles are filled

botnet bots

Rival IoT malware clash in a botnet territory battle

The Hajime malware is competing with the Mirai malware to enslave some internet of things devices

3 small business security

Microsoft patches most NSA Windows exploits, but vulnerabilities remain

Older versions, like Windows XP and Server 2003, are almost certainly open to attacks and will stay that way

Stack of legal documents with compliance and regulatory stamp

Twistlock 2.0 brings compliance controls to Docker containers

Third-party container security tool can now help organizations enforce HIPAA or PCI rules on containerized apps

microsoft windows 10 sign

Microsoft: Past patches address leaked NSA exploits

The patches -- one of which was issued last month -- address the exploits found in the Shadow Brokers leak

Load More