! Here are the latest Insider stories.
Create your own Slack bots -- and web APIs -- in R
iPad smackdown: Microsoft Office vs. Apple iWork vs. Google G Suite
7 Wi-Fi vulnerabilities beyond weak passwords
Why you need a bug bounty program
Suggestions for you
All Application Development
All Cloud Computing
Internet of Things
All Operating Systems
See All Technologies
Hacking news, information, and how-to advice
Roger A. Grimes
Build your security defense on data, not guesswork
Nowhere to hide: 9 new hacks coming to get you
Experts at RSA give their best cybersecurity advice
Users and businesses can protect themselves with these tips
A.I. faces hype, skepticism at RSA cybersecurity show
RSA's CTO is warning customers to be careful when buying products marketed as machine-learning
Protecting Your APIs Against Attack and Hijack
The application programming interface (API) is an emerging technology for integrating applications using Web technology.
Yahoo warns users of account breaches related to recent attacks
'A forged cookie may have been used ... to access your account'
Security researchers trick 'CEO' email scammer into giving up identity
Dell SecureWorks is encouraging businesses to use these tips to fight back against phishing schemes
Roger A. Grimes
Prepare for the smart bot invasion
We all know about the havoc wreaked by malicious bots, but soon, we'll have to deal with 'good' bots. How do you tell the two apart?
Experts worried about ransomware hitting critical infrastructure
Expect ransomware to grow more aggressive in the coming years, including higher ransom payments and attempts to go beyond attacking data -- by shutting down entire computer systems to utilities or factories.
Practical Guide to IT Security Breach Prevention Part I: Reducing Employee and Application Risks
Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task. Download Part I: Reducing Employee and Application Risks.
InfoWorld Tech Watch
Fahmida Y. Rashid
RSA Conference preview: The agenda can't keep up
The latest, scariest, most sophisticated threats are too fresh for the RSA Conference to cover, but the real value will be great info on how to be a better defender
Dozens of iOS apps fail to secure users' data, researcher says
The developers have misconfigured the apps to accept invalid TLS certificates, says the security researcher who detected the app vulnerabilities
Hacker takes out dark web hosting service using well-known exploit
A major hosting service for sites on the dark web has apparently been hacked, resulting in scores of hidden sites, including those offering child pornography, going offline.
How AI is stopping criminal hacking in real time
At the risk of overstating the obvious, criminals are winning the cyber war right now
4 Security Industry Analyst Recommendations on DDoS Protection
Following are 4 key take-aways with insights to the report's DDoS protection recommendations.
Why 2017 will be the worst year ever for security
High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed -- and without major infrastructure changes, it'll only get worse
Hackers are seeking out company insiders on the black market
Researchers have noticed growing activity from online black market dealers trying to recruit company insiders for cyber crime
Roger A. Grimes
Better security through obscurity? Think again
Hackers may not target obscure apps as often as popular software, but your systems still won't be much safer
Trump administration is giving us a good lesson on Twitter security
Recent mishaps with White House-related Twitter accounts are highlighting security risks with the social media service
3 Questions to Ask Your DNS Host about Lowering DDoS Risks
Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
Cisco scrambling to fix a remote code execution problem in WebEx
There’s no workaround and no final patch for a critical bug that can open up users’ computers to remote code execution attacks
Fake news alert! Internet breaches are not cloud breaches
Ignorant reporting conflates the internet with the cloud; as a result, people lose trust in what is actually a very secure platform
Can a DDoS attack on Whitehouse.gov be a valid protest?
A software engineer wants to take down the Whitehouse.gov site to oppose Trump's inauguration
Terrorists are winning the digital arms race
Countries need to work together to craft an online counternarrative, security experts say
You Might Also Like
Suspected NSA tool hackers dump more cyberweapons
Trump: It was probably Russia that hacked the DNC, Clinton campaign
How white hat hackers do bad things for good reasons
5 Reasons PBX is Killing Your Business
6 Considerations for Evaluating Hyperconverged Infrastructure
A CIO's Guide to Driving Digital Transformation
Changing the way Users Work
The Business Value of Chrome Devices in Kiosk Mode
Popular on InfoWorld
5 security practices hackers say make their lives harder
17 essential tools to protect your online identity, privacy
Which country has the best hackers: Russia or China?
INSTANTLY dtSearch® TERABYTES OF FILE+EMAIL+DB+WEB DATA; reviews/evals
Don't let security concerns inhibit your move to the cloud.
Don’t be the next breach headline; secure your data wherever it lives.
This ad will close in 20 seconds. Continue to site »