Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

hacker hack attacke cyber malware keyboard
Open Source sign in yellow field against blue sky

img 20170425 105827 01

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

img 20170425 150053 01

Old Windows Server machines can still fend off hacks. Here's how

Keeping a computer up-to-date, with the latest OS and software patch, is one of the best things you can do to stay safe from cyber threats.

8 small business security

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

Respond to ransomware in three steps: secure, assess, recover

There’s no easy button for ransomware recovery. But if you have a response plan you’ll be ready to spring into action and restore your system’s operations following an attack

20160225 stock mwc ericsson booth security locks

Webroot deletes Windows files and causes serious problems for users

Users of Webroot's endpoint security product, consumers and businesses alike, had a nasty surprise Monday when the program started detecting Windows files as malicious.

1 buying decision

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

img 20170424 170357 01

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

patch

7 patch management practices guaranteed to help protect your data

With these fairly simple practices in mind, you can stay on top of patch updates and safeguard your virtual data environments

women in red shirt looking frustrated at laptop

Customers roast Microsoft over security bulletins' demise

Users fume over extra time and effort added to their workloads because of the switch.

authentication

Bring Your Own Authentication is upending online security practices

BYOA allows consumers and businesses to employ a variety of authentication methods that are simple to setup and convenient to use

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from U.S. businesses by infecting their point-of-sale systems with malware.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

blockchain ecosystem

FAQ: What is blockchain and how can it help business?

The distributed ledger technology better known as blockchain has the potential to eliminate huge amounts of record-keeping, which can get confusing when multiple parties are involved in a transaction. But for many companies it, and...

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

intro

New products of the week 4.24.17

Our roundup of intriguing new products from companies such as Sophos and FireEye.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

apple com cyrillic

Phishing attacks using internationalized domains are hard to block

The latest version of Google Chrome restricts how domain names that use non-Latin characters are displayed in the browser in response to a recently disclosed technique that could allow attackers to create highly credible phishing...

Load More