Steve Ragan

Senior Staff Writer

Prior to joining the journalism world in 2005, Steve Ragan spent 15 years as a freelance IT contractor focused on infrastructure management and security. He's a father of two and rounded geek with a strong technical background.

Why you should fear phishing more than data breaches

Inside the thriving ransomware market

Inside the thriving ransomware market

Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market...

Equifax says website vulnerability exposed 143 million US consumers

Equifax says website vulnerability exposed 143 million US consumers

Equifax, one of the largest credit bureaus in the U.S., said on Thursday that an application vulnerability on one of their websites led to a data breach that exposed about 143 million consumers. The breach was discovered on July 29,...

8 top cyber attack maps and how to use them

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

How to recover from a ransomware attack

How to recover from a ransomware attack

Computer infected by ransomware? Don't panic. Follow the step-by-step instructions in this video for your best shot of removing it and recovering your data.

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

Google uses machine learning for new security features in Gmail

Google uses machine learning for new security features in Gmail

Google has pushed four new security features to enterprise users on G Suite, the search giant's hosted business offering. The new protections come shortly after Citizen Lab report exposed a Russia-linked Phishing and disinformation...

Malicious subtitles in popular media players could lead to remote compromise

Malicious subtitles in popular media players could lead to remote compromise

Researchers at Check Point have discovered a flaw affecting several popular media players, which stems from how they process subtitles. If exploited, an attacker could gain remote access to the victim's system. It's estimated that...

Exposed MongoDB installs being erased, held for ransom

Exposed MongoDB installs being erased, held for ransom

Security researcher Victor Gevers, co-founder of the GDI Foundation, a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding nearly two hundred of them wiped...

Security basics for the holiday season, and the year to come

Security basics for the holiday season, and the year to come

Consumers face, and willingly accept, a moderate amount of risk when they shop online or out in their local neighborhoods. This holiday season is no different, but the risk is elevated some, because criminals are looking for easy...

Q&A: The myths and realities of hacking an election

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified...

Hacking an election is about influence and disruption, not voting machines

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can...

Load More