Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

docscombig
alert blur

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

video

CIA, WikiLeaks and Doctor Who?

CSO Online's Steve Ragan and Joan Goodchild chat about the hot security news of the week, including their take on the recent WikiLeaks revelations around the CIA, and how Cisco, Samsung and Apple have responded to the information.

p1200591

Apple: Macs and iPhones are safe from newly revealed CIA exploits

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.

Google Play

Google Play faces cat and mouse game with sneaky Android malware

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.

9 ways developers can help rebuild trust on the Internet

Google to Symantec: We don't trust you anymore

Admins need to consider whether they still want to use Symantec after its repeated mistakes with issuing TLS certificates

bitcoins

Bitcoin rise fuels social media scams

The price of a single bitcoin passed that of an ounce of gold for the first time this month

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Organizations continue to get pounded even as attacks targeting individual taxpayers appear to have slowed

Mac malware Apple

Malware finds unwitting ally in GitHub

Winnti's abuse of GitHub repository leaves the site in the tricky position of deciding which projects can stay and which ones to shut down

silly walk gait

SAS, Canonical turn silly over open source

One vendor incites fear of open source software, the other continues to oversell it. Neither is correct

fence cloud barrier chain link metal

The barrier to cloud security isn't the technology

Cloud security requires that we blend the old with the new. In too many enterprises, this proves to be a political challenge

20160511 iotworld buddy lego city

Look before you leap: 4 hard truths about IoT

Data errors, security holes, and rapidly changing standards are among the pitfalls to know about

android security

Google reports mixed progress on Android security

Is the glass half full or half empty? The real issue is that it’s at the halfway mark and there's still a significant security road that Android must travel

code programming software bugs cybersecurity

LastPass fixes serious password leak vulnerabilities

Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.

05 passwords

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs.

p1200588

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them $150,000

surveillance, spying, cameras, IP cameras

US lawmakers question police use of facial recognition tech

Representatives plan legislation to limit searches of facial recognition databases by the FBI and other law enforcement agencies

video

Security Sessions: Where is VC security funding going?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding...

safe

Devops embraces security measures to build safer software

Survey finds that devops teams are automating security throughout the software development lifecycle to create better and safer code

Load More