Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

security group team circuitry
keys

security training ts

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

Closeup of combination safe

Mobile is still the safest place for your data

IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you

spyware burglar crack safe computer

Adobe Acrobat Reader DC security update installs Chrome spyware

Adobe says the data collected by the new “Adobe Product Improvement Program” spyware is anonymous, thus innocuous

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

NSA headquarters

Suspected NSA tool hackers dump more cyberweapons

The Shadow Brokers released hacking tools designed to spy on Windows systems after attempting to sell a large cache for bitcoin

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization

security camera attack surveillance

Trump's CIA nominee grilled on his advocacy of surveillance database

Nominee Mike Pompeo has called on Congress to reverse its 2015 decision to rein in the phone metadata collection program run by the NSA

data breach predictions

5 data breach predictions for 2017

Stay ahead of emerging threats -- here are five key data breach trends you should anticipate in 2017

video

Security Sessions: Will security budgets go up in 2017?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with CSO Publisher Bob Bragdon about recent research around IT budgets, and how much of the budgets are allocated towards security. They also discuss...

microsoft keyboard

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard has quiet-touch keys, and the full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your...

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

nup 173075 0005

Trump: It was probably Russia that hacked the DNC, Clinton campaign

The incoming president comes as close as he ever has to agreement with U.S. intelligence

valentine hero

How White Hat hackers do bad things for good reasons

Some companies are love struck with social engineering to monitor their employees

twitter 292988 1280

Families of ISIS victims sue Twitter for being 'weapon for terrorism'

Analysts question whether a social network can be held responsible for users' actions

pay money ransom dollars

Pay the ransom? You won't get your data back

Admins, act now to avoid ransomware and other forms of extortion -- you won't likely get your data back even when you pay

US Capitol

US Intel: Russia hacked Republican groups during election

Democratic groups and figures weren’t the only ones targeted in Russia’s suspected campaign to influence last year’s election. The country’s cyberspies also targeted computers from state-level Republican groups and stole information...

Load More