Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

elctrical plug shock
A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

devops

Automate, integrate, collaborate: Devops lessons for security

Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well

clicks pageviews traffic denial of service ddos attack

Poorly configured DNSSEC servers at root of DDoS attacks

Admins need to ensure that their DNSSEC domains are properly set up -- which can be easier said than done

twitter logo shattered glass

Twitter suspends 360,000 accounts for terrorist ties

The social network has suspended 235,000 in last six months alone, with rate of daily suspensions up 80%

NSA headquarters

The NSA's hoard of cyber weapons makes some experts nervous

An alleged hack has raised questions about the agency's practices

bad password pin 1234

Keep using password managers -- bugs and all

A furor over bugs in password managers left users in a jam. Self-proclaimed security empress Jessy Irwin clears up the confusion

wifi security cam

50% off Vimtag VT-361 Pan&Tilt HD WiFi Video Security Camera with Night Vision - Deal Alert

This full-featured camera broadcasts over wifi allowing you to view from multiple mobile devices, and records to micro SD. Remote pan/tilt, 2-way voice, and night vision capabilities included.

NSA headquarters

Alleged NSA data dump contains sophisticated hacking tools

Cisco said that the sample files reveal an undetected software flaw in its products

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

trump chart

Trump's 'extreme' anti-terrorism vetting may be H-1B nightmare

Many people from 'dangerous and volatile regions' work in the U.S. on H-1B visas, and Trump's plan would penalize these workers because of their birthplace.

ransomware locked computer stock image cropped

Cerber ransomware earns $2.3M with 0.3% response rate

The fast-growing Cerber ransomware uses an affiliate distribution model that recruits non-technical customers, according to a new report by Check Point

iris scan security 138208300

Galaxy Note 7 catches the eye and more

The new Samsung phablet provides a full portfolio of security options that truly advance the Android cause for business

snow globe with winter scene

How 3 fintech startups are shaking up security

The financial industry has invested heavily in staff, processes, and technology to improve security, but some startups are taking a more innovative approach

party favors

6 security advances worth celebrating

In a world besieged by criminal hackers, we'll take all the good security news we can get. Here are six advances that can improve your defenses

shellshocked bash bug

Organizations can learn from Apple's bug bounty approach

Not all bug bounty programs need to be public free-for-alls. Apple provides a slower model

machine learning robot face data circuit

Machine learning offers new hope against cyber attacks

Game-changing technology could deliver a new level of protection for enterprise networks

supply chain

U.S. intelligence to share supply chain threat reports with industry

Focus is expected to be on bad actors to pre-empt attacks, not just signatures in existing attacks

New features in Windows 10 laptop

Respect: Windows 10 security impresses hackers

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

2016 jetta 5173

Millions of Volkswagens can be broken into with a wireless hack

Researchers say the remote key systems for most VWs since 1995 are affected

Load More