Security

Security | News, how-tos, features, reviews, and videos

A conceptual representation of accessing username and password credentials.
a clock half-submerged in water

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Passwordless authentication, Chromium-based Edge support

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 2004 feature release.

An unknown number calls a mobile phone amid pixelated data.

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

intro security vulnerability

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now.

thread weave colorful network web

What is IoT? The internet of things explained

The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare.

VPN / network security

Cisco, others, shine a light on VPN split-tunneling

Cisco, Microsoft and others play up VPN split-tunneling features to handle growing enterprise remote workload security

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Zoom video conferencing  >  People in a conference room are connected with remote participants.

Zoom to add end-to-end encryption with Keybase acquisition

The move is the latest effort by the videoconferencing software firm to improve security and privacy on its platform as use soars.

water infrastructure / wastewater treatment facility / sewage treatment plant

Attempted cyberattack highlights vulnerability of global water infrastructure

Water utilities often have few cybersecurity resources and are subject to few regulations. A failed Stuxnet-like attack on Israel's water supply shows how dangerous that could be.

Activating a protective virtual shield amid COVID-19 coronavirus morphology

4 tips for protecting users from COVID-19-targeted attacks

Remote users in particular are vulnerable to coronavirus-themed phishing attempts, malicious domains, and repurposed malware. Protect them with these basic steps.

Blazing, fiery cloud raining binary code.

Cloud servers hacked via critical SaltStack vulnerabilities

Attackers were quick to exploit recently announced vulnerabilities to deploy cryptominers. Patch Salt now.

coronavirus covid 19 pandemic disease binary map world 5060518 by mintblack4u pixabay cc0 2400x1600

COVID-19 attack campaigns target hardest hit regions, research shows

Attackers shift their focus to where coronavirus infections are rising and use tactics that make their efforts hard to block.

malicious email alerts / warnings / dangers

Email spoofing explained: Who does it and how?

Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.

pulse heart rate monitor

Exclusive survey: What 400 IT leaders really think about the COVID-19 crisis

How did IT leaders respond to a world turned upside-down? And how has the coronavirus pandemic changed spending plans over the next year? A fresh CIO survey offers illuminating answers.

gsuite admin console

Google extends G Suite identity and security device management to Windows 10 PCs

IT admins can now use the G Suite console to secure G Suite accounts on Windows 10 using Google's anti-hijacking and suspicious-login-detection technologies.

Danger / threats  >  storm clouds / lightning

UPDATE 4-28: How enterprise networking is changing with a work-at-home workforce

As the coronavirus spreads, public and private companies as well as government entities are requiring employees to work from home, putting unforeseen strain on all manner of networking technologies and causing bandwidth and security...

micro segmentation security lock network 2400x1600

Microsegmentation product snapshots: Edgewise Networks, VMware and ShieldX Networks

Vendors are stepping forward to help enterprises update their infrastructure security to prevent catastrophic intrusions and data thefts. Here's a look at three microsegmentation technology market players, showing what they offer, how...

securitycamera hub image 2019
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Load More