Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

20160511 iotworld buddy lego city
android security

code programming software bugs cybersecurity

LastPass fixes serious password leak vulnerabilities

Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.

05 passwords

iPhone, Mac owners: How to stymie hackers extorting Apple, threatening to wipe devices

Hackers claiming to have hundreds of millions of iCloud credentials have threatened to wipe date from iPhones, iPads and Macs.

p1200588

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them $150,000

surveillance, spying, cameras, IP cameras

US lawmakers question police use of facial recognition tech

Representatives plan legislation to limit searches of facial recognition databases by the FBI and other law enforcement agencies

video

Security Sessions: Where is VC security funding going?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding...

safe

Devops embraces security measures to build safer software

Survey finds that devops teams are automating security throughout the software development lifecycle to create better and safer code

code programming software bugs cybersecurity

Flaws in Moodle CMS put thousands of e-learning websites at risk

Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

biometrics

Could iris recognition be coming to the enterprise?

Iris recognition will be widely included in future mobile devices reducing the hardware investment and potentially preventing fraudulent access via biometric authentication

airplane cabin Airbus plane

US bans electronics larger than smartphones in cabins on certain flights

The Department of Homeland Security cited the threat of terrorists smuggling explosive devices in various consumer items

2 two factor

Vastly improve your IT security in 2 easy steps

Losing the battle against the bad guys? Keep your software patched and defend against social engineering, and you might start winning a few

Security online

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

Russia

Russia will strike US elections again, FBI warns

Future U.S. elections may very well face Russian attempts to interfere with the outcome, the FBI and the National Security Agency warned on Monday.

FBI Comey

FBI looks into Russian hack of US election, possible Trump involvement

Comey confirms government investigation into 'the nature of any links' between the Trump campaign and the Russian government, and shoots down Trump claims that former president wiretapped Trump Tower

Digital Key encryption

Some HTTPS inspection tools might weaken security

Many security products that intercept HTTPS traffic don't properly validate certificates, US-CERT has warned

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

Edward Snowden Spiegel headline

Cebit showcases security after Snowden

One of the biggest changes on the internet in the four years since his revelations about NSA surveillance is the growth in the use of encryption

linux security lick public domain

Leading Linux distros dawdle as kernel flaw persists

A race condition flaw has been fixed in the mainline Linux kernel, but some Red Hat, Canonical, and Debian distributions don't yet have patches

Load More