Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

iphone security stock
US Capitol

3 outlet plug

46% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert

This compact surge protector provides 600 joules of protection, 3 outlets, and a folding wall tap plug. Two USB ports (2.1 Amp) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices.

Digital Key encryption

LastPass is scrambling to fix another serious vulnerability

Flaw in the password manager could allow malicious websites to infect computers with malware or steal users' passwords

hidden door

How to respond to device and software backdoors inserted or left by vendors

Here are the challenges to finding them, mitigating the easily infected openings, and responding to this hardware, software, and IoT-based dilemma

caution tape

Free public certificate authorities: Nice idea, big flaw

Certificate authorities such as Let's Encrypt attempt to provide a valuable service for all. But there's a serious problem with what they offer

security lock code

Automation is the answer for stronger container security

How vulnerability management and threat prevention can move at the speed of continuous delivery

docscombig

Microsoft's Docs.com is sharing dangerously sensitive personal files, information

Docs.com shares documents with the world by default, but that hasn't stopped people from uploading their bank statements

alert blur

Critical flaw alert! Stop using JSON encryption

Developers shouldn't use JSON Web Tokens or JSON Web Encryption in their applications at all, lest their private keys get stolen

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

video

CIA, WikiLeaks and Doctor Who?

CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.

p1200591

Apple: Macs and iPhones are safe from newly revealed CIA exploits

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.

Google Play

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.

9 ways developers can help rebuild trust on the Internet

Google to Symantec: We don't trust you anymore

Admins need to consider whether they still want to use Symantec after its repeated mistakes with issuing TLS certificates

bitcoins

Bitcoin rise fuels social media scams

The price of a single bitcoin passed that of an ounce of gold for the first time this month

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Organizations continue to get pounded even as attacks targeting individual taxpayers appear to have slowed

Mac malware Apple

Malware finds unwitting ally in GitHub

Winnti's abuse of GitHub repository leaves the site in the tricky position of deciding which projects can stay and which ones to shut down

silly walk gait

SAS, Canonical turn silly over open source

One vendor incites fear of open source software, the other continues to oversell it. Neither is correct

fence cloud barrier chain link metal

The barrier to cloud security isn't the technology

Cloud security requires that we blend the old with the new. In too many enterprises, this proves to be a political challenge

20160511 iotworld buddy lego city

Look before you leap: 4 hard truths about IoT

Data errors, security holes, and rapidly changing standards are among the pitfalls to know about

Load More