Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

screen shot 2017 02 27 at 4.33.35 pm
cyberattack laptop arrows war fight

trump cpac

Will a cyber crisis add to chaos of Trump’s first 100 days?

Such a prediction seems about as certain as predicting that Trump will take to Twitter sometime during the week

170227 mwc 160433

This tiny chip could revolutionize smartphone and IoT security

The tiny chip generates truly random numbers -- the basis for cryptography

computer programmer or hacker

Red alert! Beware of insiders bearing APTs

Big enterprises worry about APTs -- and employees who may be using them to engage in corporate espionage. These measures can help you catch the perps

Digital Key encryption

Chrome extension brings encryption to Gmail

E2Email, Google's latest open source project, wants to bring encrypted email to the masses, but without strong leadership, this project may wind up going nowhere

Graphic blue background with computer monitor and bug on top

What IT must do now that Cloudflare leaked user data

No one really knows what website and mobile app information got leaked where, but here's what IT should consider doing to be safe

don't panic fortune cookie

Don't panic about SHA-1—fix it

Crypto experts agree it's time to ditch SHA-1 if you haven't already, but also to know where the real risks are

ransomware data laptop

Ransomware 'customer support' chat reveals criminals' ruthlessness

F-Secure publishes 34 pages of chat transcripts between victims and gang's 'support rep'

head on collision

Google kills SHA-1 with successful collision attack

SHA-1 in digital certificates and cryptographic keys hasn't been safe for years. With the world's first successful collision attack, the clock has run out for the hash function

Uber
video

Breaking and protecting devops tool chains

Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains.

Still
video

Bruce Schneier and the call for "public service technologists"

Bruce Schneier, CTO of IBM Resilient on the increasing importance of technologist's presence in education and policy-making.

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

Digital Key encryption

New MacOS ransomware spotted in the wild

A new file-encrypting ransomware program for macOS is being distributed through bittorrent websites and users who fall victim to it won't be able to recover their files, even if they pay.

stethoscope iphone public domain

Netflix Stethoscope gives users a BYOD security checkup

The IT-compiled web application provides users a personalized list of security recommendations for their own computers, smartphones, and tablets

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

Adobe Flash player v10 icon

Microsoft rolls out KB 4010250 Flash Player update for Windows 8.1 and 10

In a bit of nostalgia, today's patch is attached to a Security Bulletin and not included in cumulative updates

pulling companies apart chain broken

The real problem with the security industry

What we learned at the RSA Conference: The security industry is failing its task of keeping users and information safe because it refuses to play well with others

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

Hackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls

Load More