Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Digital Key encryption
1 darkweb marketplace

151119 paris attacks 2

Terrorists are winning the digital arms race

Countries need to work together to craft an online counternarrative, security experts say

security group team circuitry

The war for cybersecurity talent hits the Hill

The workforce shortage of cybersecurity workers in the U.S. currently is at 300,000 or more, experts estimate

keys

Google ventures into public key encryption

Google's Key Transparency project offers a model of a public lookup service for encryption keys

security training ts

Got microservices? You'd better secure them

Our modern world of containers and microservices presents new challenges that open new vulnerabilities if left unaddressed

Closeup of combination safe

Mobile is still the safest place for your data

IT likes to fret about smartphones and tablets, but more established technologies—even paper documents—are where the data-breach risks lie

Digital Key encryption

Google Cloud Platform finally offers key management service

Google prides itself on its encryption efforts, but it lags behind Amazon and Microsoft in providing encryption tools for the cloud

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you

spyware burglar crack safe computer

Adobe Acrobat Reader DC security update installs Chrome spyware

Adobe says the data collected by the new “Adobe Product Improvement Program” spyware is anonymous, thus innocuous

security code big data cyberespionage byte

After MongoDB, ransomware groups hit exposed Elasticsearch clusters

Over 600 Elasticsearch instances had their data wiped and replaced with a ransom message

NSA headquarters

Suspected NSA tool hackers dump more cyberweapons

The Shadow Brokers released hacking tools designed to spy on Windows systems after attempting to sell a large cache for bitcoin

godaddy office

GoDaddy revokes nearly 9,000 SSL certificates issued without proper validation

A bug in the CA's domain validation system for the past five months could have allowed attackers to obtain certificates without authorization

security camera attack surveillance

Trump's CIA nominee grilled on his advocacy of surveillance database

Nominee Mike Pompeo has called on Congress to reverse its 2015 decision to rein in the phone metadata collection program run by the NSA

data breach predictions

5 data breach predictions for 2017

Stay ahead of emerging threats -- here are five key data breach trends you should anticipate in 2017

video

Security Sessions: Will security budgets go up in 2017?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with CSO Publisher Bob Bragdon about recent research around IT budgets, and how much of the budgets are allocated towards security. They also discuss...

microsoft keyboard

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard has quiet-touch keys, and the full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your...

Digital Key encryption

Professionally designed ransomware Spora might be the next big thing

Security researchers have found a new very well designed ransomware program dubbed Spora that can perform strong offline file encryption and brings several innovations to the ransom payments model.

nup 173075 0005

Trump: It was probably Russia that hacked the DNC, Clinton campaign

The incoming president comes as close as he ever has to agreement with U.S. intelligence

valentine hero

How White Hat hackers do bad things for good reasons

Some companies are love struck with social engineering to monitor their employees

Load More