Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

3 patches
toolbelt tools handyman repairs

Firefox, Mozilla

Firefox blocks websites with vulnerable encryption keys

Users will receive an error when trying to access web servers that use weak Diffie-Hellman key exchange with weak keys

cloud building security

What to do when hackers break into your cloud

Single-tenant breaches can and do happen -- and it's usually IT's fault. Here's how to recover from one and prevent another

windows bugs crashes

Microsoft opens up its 'million dollar' bug-finder

Project Springfield, which includes Microsoft's in-house testing technology for Windows and Office apps, uses whitebox fuzzing technology to sniff out flaws that could lead to crashes

video

Why employees are still a security risk

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild speaks with Michael Bruemmer, vice president at Experian Data Breach Resolution, about a recent survey that said companies are unprepared to stop...

FBI Comey

FBI reports more attempts to hack voter registration system

There have also been 'scanning activities,' which could be preludes to attacks

blackberry slider clean

What’s left for BlackBerry? The products that still matter

Mobile security, management, and communications tools are what BlackBerry is now all about, though the quality varies

army of robots 176859594

Microsoft's cloud dominance comes with a security risk

Microsoft and third parties are layering on more security technology to keep vulnerabilities harder to exploit at scale

strata apache spot hadoop

Meet Apache Spot, a new open source project for cybersecurity

The effort taps big data analytics and machine learning for advanced threat detection

blockchain code

Financial sector expands use of blockchain databases

Survey shows 65 percent expect to use blockchain distributed database software within three years

Glowing band-aids on red background

Analysts laud and lance new Microsoft browser armor

Reviews call Microsoft's new security model for its Edge browser both a terrific idea and a band-aid that doesn't address Windows' real problems

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Similar attacks may be a nation calibrating how strong core internet defenses really are

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

The company isn't saying how it arrived at the conclusion that its massive data breach was carried out by a state-sponsored actor

sofacy 1

New Mac Trojan uses the Russian space program as a front

The Komplex Trojan can download, execute, and delete files from an infected Mac

password security reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

DDoS attacks got a power boost thanks to hundreds of thousands of insecure IoT devices

microsoft dcu malware lab

Here's how Microsoft is using containerization to protect Edge users

Windows Defender Application Guard locks untrusted browsing sessions away from the rest of the OS

Chip and

Trump hotel chain fined over data breaches

The chain, one of Donald Trump’s businesses, also delayed in reporting the breaches to consumers

Load More