Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

Internal Revenue Service IRS tax filing form 1040

seesaw balance lego

Let’s bring back the balance between IT and business

IT's past abuses haunt it in the present, but it doesn't have to stay that way

gmail icon

Google adds warning to unencrypted emails

Users will also be told when they may be conversing with someone who is not a real person

3648438218 2ecc0c3414 o

US government wants to sharply increase spending on cyber security

The $3.1 billion plan calls for replacing outdated IT infrastructure and recruiting cyber security experts into government roles

ecommerce thinkstock

Adwind evolves to offer cyber criminals one-stop shop for malware

Remote administration tool Adwind is back on the market, this time as JSocket, an online marketplace selling malware and a slew of other tools

security 2016 cybercrime

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

Java logo

Java installer flaw shows why you should clear your Downloads folder

Older versions of the Java installer were vulnerable to binary planting in the Downloads folder

DHS hack

Report: Hacker steals, posts personal details on 9,000 DHS employees

Hacker says he will next post the records of 20,000 FBI workers

Cyber criminals cash out using PowerShell, other legitimate tools

Kaspersky Lab found three cyber crime gangs using customized malware and APT-style reconnaissance to get the stolen money into their pockets

video

I forgot my Windows 10 password!

Forgetting your Windows 10 password isn't the disaster it used to be. Windows lets you get back on track with a pretty easy reset process. Here's how it works.

technologies cia wants 1

8 hot technologies the CIA wants

In-Q-Tel, the CIA’s investment arm, is interested in expertise ranging from 3D printing of electronics to reconnaissance drones that can hover indefinitely

video

Bypassing the Windows 10 password with a PIN

There's an easier way to get into Windows: setting up a numerical PIN, just like you'd use with a bank ATM. Here's how to do it.

docker

Docker goes rootless -- and that's a good thing

Containers will no longer have to be run as root in Linux, thanks to a new feature in Docker 1.10

automated security defense protection

Dell BIOS verification extends security focus

Dell is adding BIOS protection to its suite of security protections. One solution handles advanced authentication, encryption, and malware detection along with BIOS verification

cloud security lock

How to secure Amazon Web Services like a boss

Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how

boxkeysafe 1000x393

Box makes it easier for businesses to control encryption of cloud data

The new KeySafe service leverages Amazon's cloud to help companies lock files down

video

A huge X-ray system is scanning entire trucks at Super Bowl 50

A massive truck-based X-ray system and 32-mile ban on drones are two of the security measures in place for Super Bowl 50 in Santa Clara.

dell xps 13

Dell is stepping in to protect the boot layer of PCs, tablets

Dell is deploying a verification tool to ensure the boot layer in PCs and tablets hasn't been hacked

video

What Is Social Engineering?

CSO presents an animated explainer on how data criminals exploit human psychology to gain access to a company's data, rather than by hacking or technical measures.

Load More