Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy


Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

Mingis_on_Tech
video

Mingis on Tech: How linguistics can help catch cyberattackers

When it comes to tracking down the bad actors behind malware and ransomware, cybersecurity firms are turning to linguists.

csan 001 top 15 security breaches
video

The 15 worst data security breaches of the 21st century

Some of the largest companies in the U.S. have been targets of hackers, including Yahoo, JP Morgan Chase and TJX. Watch as we detail the top 15 breaches and their overall impact on customers or employees.

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

1 incident response police tape crime death

The 2 cloud security myths that must die

Too many people treat cloud security as a black-and-white proposition, which risks wasting lots of money or having security gaps—or both

robots

Google adds Recaptcha API to Android to block the bots

The revised method for distinguishing people from malware bots should make it easier for mobile users to prove they are human

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

template c100.00 13 28 47.still001
video

Mingis on Tech: The alphabet soup of mobile device management

Do you know your MDM from MAM and EMM? It's all about BYOD, and how companies can keep data safe while making it easier for workers to be productive with their own devices.

hiring

Choose your devsecops team wisely: Your apps depend on it

How choosing the right team will keep your business secure and help it keep pace with the sprinting speeds demanded by the market.

chatbots chatbot bot

What's all the chatter about chatbots

Chatbots get a lot of hype, but they also have risks and limitations. To make the most of them, focus on their most helpful capabilities, provide careful oversight and pay close attention to customer response.

panda security

55% off Panda Security Ransomware and Virus Protection Products for Home Users - Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using this special code at checkout.

ransomware

Will Linux protect you from ransomware attacks?

Also in today’s open source roundup: Ars Technica reviews Ubuntu 17.04, and Ubuntu has a login screen security flaw.

hacker

Digital signature service DocuSign hacked and email addresses stolen

DocuSign had last week warned of phishing emails that spoofed its brand

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way. The good news is that translates into a smaller average attack size

fighting office workers man women argue angry mad upset team

Waah! WannaCry shifts the blame game into high gear

Every security crisis presents the opportunity to point fingers, but that's just wasted energy. The criminals are at fault—and we need to work together to stop them

nsa aerial

Microsoft blames US stockpiled vulnerability for WannaCry ransomware attack

The stockpiling of vulnerabilities by governments is a big problem, the company said

ransomware at your service 3

WannaCry ransomware slipped in through slow patching

IT teams have a gap of several weeks between when patches are released and deployed, giving criminals time to make WannaCry a reality

5 api automated robot keyboard

Why snafus like HP’s keylogger will happen again

The problem wasn't the length of time it took HP to respond to security researchers—it's that unreviewed code proliferates supply chains everywhere

Load More