Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

free security avast

malware payment terminal credit card

Dridex banking malware mysteriously hijacked to distribute antivirus program

An unknown person -- possibly a white hat hacker -- gained access to some of the servers that cybercriminals use to distribute the Dridex online banking Trojan and replaced the malware with an installer for Avira Free Antivirus.

robot keyboard

China vs. the machine (learning)

The highly publicized agreement last fall between the U.S. and China to end economic espionage has had little effect. Experts say that it is up to companies to protect themselves, and that tools like machine learning can help.

cloud security lock

How to secure Amazon Web Services like a boss

Amazon does a great job with infrastructure, but securing your cloud applications and environment is up to you. Here's how

Security

The Neutrino exploit kit has a new way to detect security researchers

The developers of the Neutrino exploit kit have added a new feature intended to thwart security researchers from studying their attacks.

video

A huge X-ray system is scanning entire trucks at Super Bowl 50

A massive truck-based X-ray system and 32-mile ban on drones are two of the security measures in place for Super Bowl 50 in Santa Clara.

boxkeysafe 1000x393

Box makes it easier for businesses to control encryption of cloud data

Box has made it easier for its customers to control how stored data is encrypted with an update announced Thursday.

Data center servers

Serious flaws found in Netgear's NMS300 network management system

Serious vulnerabilities in the Netgear NMS300 ProSafe network management system, an application used to discover, monitor and configure a wide range of network devices, can allow hackers to take control of the servers it's running on....

dell xps 13

Dell is stepping in to protect the boot layer of PCs, tablets

Dell's business laptops and tablets will get an extra layer of protection from hackers with a new security tool being loaded into the company's portable computers.

kaspersky lab

What did we learn about cybersecurity in 2015?

Cybercrime is always a hot-button issue, and last year was no different. What lessons can we learn from some of the more insidious trends and events to better prepare ourselves for the year ahead?

samsung dashlane

The best password manager on Android

You really need to be using a password manager, and Dashlane is currently at the top of the heap.

motorola focus 73

Study of another IP camera reveals serious problems

An in-depth analysis of yet another Internet-connected security camera has revealed a host of software problems.

chromodo, comodo

Comodo to fix major flaw in knock-off Chrome browser

Comodo said it is planning to release on update on Wednesday that fixes a severe vulnerability in a custom web browser it developed and markets as enhancing users' security.

browsers world wide web internet

Google expands Chrome's Safe Browsing defenses to sniff out ad scams

Google is expanding its Safe Browsing technology to take into account online ads that try to scam users into divulging personal information or downloading malware.

Social Engineer example

CSO Explainer: What is social engineering?

Need a fun way to explain how data thieves might be getting into your building? Share this video!

video

What Is Social Engineering?

CSO presents an animated explainer on how data criminals exploit human psychology to gain access to a company's data, rather than by hacking or technical measures.

hereO GPS watch

Flaws in smart toy back-end servers puts kids and their families at risk

Researchers from Rapid7 found privacy-invading vulnerabilities in the Web services used by the Smart Toy line of interactive stuffed animals and the hereO GPS watch for children.

Digital Key

Socat vulnerability shows that crypto backdoors can be hard to spot

The Socat networking service used a non-prime number for its key exchange mechanism, potentially allowing attackers to eavesdrop on encrypted connections opened with the tool.

tiananmen beijing

China's next five-year plan offers preview of cybersecurity targets

Is your industry next in line to be targeted by China's government-sponsored hackers? To find out, look at China's latest five-year plan, suggests a global threat report released this morning

Load More