Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

4120913056 d1931898b4 o
book safe

fbi seal

FBI warns that hackers are targeting state election systems

The FBI has reportedly found evidence that foreign hackers breached two state election databases in recent weeks.

malware payment terminal credit card

Sophisticated malware possibly tied to recent ATM heists in Thailand

Security researchers have found a sophisticated malware program that may have been used recently by a gang of hackers to steal more than $350,000 from ATMs in Thailand.

intro

New products of the week 8.29.16

Our roundup of intriguing new products from companies such as HPE and Sumo Logic.

snakeoil salesman

Are InfoSec vendors ‘sowing confusion’ and selling ‘useless’ products?

Security vendors are doing just swell but how much do they do - outside of selling products - to help the world become a safer place? CSO Online investigates.

tools preventing data leaks 1

Top tools for preventing data leaks

We tested data loss prevention (DLP) tools from Comodo, Digital Guardian and Forcepoint. These products are designed to stop protected data from being shared in multiple ways, everything from e-mail attachments to printing to even...

st jude pacemaker

Medical device security ignites an ethics firestorm

One security research company is taking a controversial approach to disclosing vulnerabilities: It’s publicizing the flaws as a way to tank a company’s stock.

chain security stock

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud...

Firefox

Mozilla launches free website security scanning service

Mozilla has built an online scanner that can check if websites have the best security settings in place.

space launch systems

NASA CIO allows HPE contract's authority to operate to expire

In the wake of continued security problems, NASA's CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in 2011 to address problems with the agency's outdated and insecure...

dropbox logo sign

Dropbox prompts certain users to change their passwords

Dropbox is asking users who signed up before mid-2012 to change their passwords if they haven’t done so since then.

Legal law gavel hammer courts

U.S. convicts Russian hacker in credit card theft scheme

A U.S. federal court has convicted a Russian hacker of stealing and selling over 2 million credit card numbers.

ios 9.3

Apple patches iOS security flaws found in spyware targeting activist

To spy on a human rights activist, government hired hackers may have gone as far to use three previously unknown vulnerabilities in Apple’s iOS.

hacker hacked security risk

So your company’s been hacked: How to handle the aftermath

Education and planning are key, cyber-security expert Tyler Cohen Wood says.

20151005 Cisco headquarters sign

Cisco starts patching firewall devices against NSA-linked exploit

Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

pixelated clouds reflecting on building windows

Experts challenge Skyhigh's patent for cloud-based encryption gateway

Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some experts say that the technology is...

cyber attack stock image

New collision attacks against triple-DES, Blowfish break HTTPS sessions

Legacy ciphers such as triple-DES and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key

life preserver

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a...

s630 cab office parliament cc

Facebook, Google, Twitter lax on terrorists’ misuse of their sites, say UK MPs

A panel of U.K. lawmakers has described as “alarming” that social networking companies like Facebook, Twitter and Google's YouTube have teams of only a few hundred employees to monitor billions of accounts for extremist content.

Load More