Security

Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.

patch

7 patch management practices guaranteed to help protect your data

With these fairly simple practices in mind, you can stay on top of patch updates and safeguard your virtual data environments

women in red shirt looking frustrated at laptop

Customers roast Microsoft over security bulletins' demise

Users fume over extra time and effort added to their workloads because of the switch.

authentication

Bring Your Own Authentication is upending online security practices

BYOA allows consumers and businesses to employ a variety of authentication methods that are simple to setup and convenient to use

Legislation of privacy security keyboard law legal gavel court ruling

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from U.S. businesses by infecting their point-of-sale systems with malware.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

blockchain ecosystem

FAQ: What is blockchain and how can it help business?

The distributed ledger technology better known as blockchain has the potential to eliminate huge amounts of record-keeping, which can get confusing when multiple parties are involved in a transaction. But for many companies it, and...

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

intro

New products of the week 4.24.17

Our roundup of intriguing new products from companies such as Sophos and FireEye.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

apple com cyrillic

Phishing attacks using internationalized domains are hard to block

The latest version of Google Chrome restricts how domain names that use non-Latin characters are displayed in the browser in response to a recently disclosed technique that could allow attackers to create highly credible phishing...

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

1 sign contract

What's in the fine print of your disaster recovery vendor agreement?

Make sure these points are in your service-level agreements with DRaaS vendorsWhen considering DRaaS vendors, ask your potential partner how far they are willing to go in protecting your business and your data, and if these promises...

code programming software bugs cybersecurity

Drupal fixes critical access bypass vulnerability

The Drupal project has released a patch to fix a critical access bypass vulnerability that could put websites at risk of hacking.

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

How to hold on to Windows 7 for the long haul

Developer lifts Windows 7's update blockade with unsanctioned patch

An anonymous developer created the patch, which negates Microsoft's barring of security updates from Windows 7 and 8.1 PCs equipped with the very newest processors.

linksys wrt3200acm front 1200

Flaws let attackers hijack multiple Linksys router models

Two dozen Linksys router models are exposed to attacks that could extract sensitive information from their configurations, cause them to become unresponsive and even completely take them over.

businesspeople passing notes in a meeting 78781404

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector, the percentage was even higher -- 81 percent said they should...

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

Load More