Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

head on collision

Still
video

Bruce Schneier and the call for "public service technologists"

Bruce Schneier, CTO of IBM Resilient on the increasing importance of technologist's presence in education and policy-making.

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

Digital Key encryption

New MacOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

stethoscope iphone public domain

Netflix Stethoscope gives users a BYOD security checkup

The IT-compiled web application provides users a personalized list of security recommendations for their own computers, smartphones, and tablets

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

Adobe Flash player v10 icon

Microsoft rolls out KB 4010250 Flash Player update for Windows 8.1 and 10

In a bit of nostalgia, today's patch is attached to a Security Bulletin and not included in cumulative updates

pulling companies apart chain broken

The real problem with the security industry

What we learned at the RSA Conference: The security industry is failing its task of keeping users and information safe because it refuses to play well with others

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

Hackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls

23922465470 fe3c8b8cdf o

Verizon knocks off $350M from Yahoo deal after breaches

Yahoo will also share in some potential liabilities related to two massive data breaches

Woman surprised with balloons

Surprise! Microsoft issues Flash patches for Internet Explorer, Edge

After announcing last week that February's patches would be delayed until March, Microsoft alerts large customers that security patches are due today—but details remain sketchy

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

red blue tools

5 open source security tools too good to ignore

Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Talking heads
video

RSA demo: TruSTAR anonymizes incident data to improve information exchange

TruSTAR's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies.

Talking heads
video

Why robotics is key to cybersecurity's future

Chad Holmes, Principal of Ernst & Young LLP sits down with Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

Load More