Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

cleaning sponges detergent wash rinse chores
Digital Key encryption

stethoscope iphone public domain

Netflix Stethoscope gives users a BYOD security checkup

The IT-compiled web application provides users a personalized list of security recommendations for their own computers, smartphones, and tablets

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

Adobe Flash player v10 icon

Microsoft rolls out KB 4010250 Flash Player update for Windows 8.1 and 10

In a bit of nostalgia, today's patch is attached to a Security Bulletin and not included in cumulative updates

pulling companies apart chain broken

The real problem with the security industry

What we learned at the RSA Conference: The security industry is failing its task of keeping users and information safe because it refuses to play well with others

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

Hackers can trick Java and Python applications to execute rogue FTP commands that would open ports in firewalls

23922465470 fe3c8b8cdf o

Verizon knocks off $350M from Yahoo deal after breaches

Yahoo will also share in some potential liabilities related to two massive data breaches

Woman surprised with balloons

Surprise! Microsoft issues Flash patches for Internet Explorer, Edge

After announcing last week that February's patches would be delayed until March, Microsoft alerts large customers that security patches are due today—but details remain sketchy

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts say that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

red blue tools

5 open source security tools too good to ignore

Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe

How You Will Get Hacked Next

Nowhere to hide: 9 new hacks coming to get you

The proliferation of insecure devices in every facet of our lives will have consequences far beyond the digital realm

Talking heads
video

RSA demo: TruSTAR anonymizes incident data to improve information exchange

TruSTAR's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies.

Talking heads
video

Why robotics is key to cybersecurity's future

Chad Holmes, Principal of Ernst & Young LLP sits down with Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage

dsc05783

Experts at RSA give their best cybersecurity advice

Users and businesses can protect themselves with these tips

01 intro crowd conference

RSA 2017 hit parade: All the cool new security tools

RSA, the world’s largest security conference, went down this week in San Francisco, with attendees from around the world gathering to hear the latest strategies for fighting cyberattacks

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

Load More