Security

Security | News, how-tos, features, reviews, and videos

Two-sided hybrid face and hands

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Safeguard your code: 17 tips to develop more-secure code

Rigorous input testing, passwords, encryption—security is a feature no programmer can afford to overlook

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

salted hash thumbnail multi final
video

Don't ignore application security | Salted Hash Ep 35

In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

template c100.00 08 03 11.still001
video

Mingis on Tech: The blockchain evolution, from services...to smartphones

Oracle joins other major tech vendors by rolling out its blockchain-as-a-service offering, and two smartphone makers plan to include the technology in new devices this year. Get the latest on the blockchain craze.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

'blockchain' set in metal type against a circuit board

Sorry, but blockchain databases are just not that secure

Premature, untested software, criminal infiltration, multiple technology variations, and lack of experience are just some reasons to distrust distributed hyperledgers in your business

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

astract code [Thinkstock]

What’s new in PHP 7.3

The production release is planned for November 29, 2018

cloud security

How to get the most cloud security

User education is more effective than the best security technology alone

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

template c100.00 00 52 07.still001
video

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

industrial iot internet of things smart enterprise

Inside Microsoft’s Azure Sphere hardware for secure IoT

As more and more smart devices are deployed, securing and managing them becomes more and more important

risk shark attack stormy seas life preserver rescue

Oracle plans to dump risky Java serialization

A “horrible mistake” from 1997, the Java object serialization capability for encoding objects has serious security issues

Load More