Security

Security | News, how-tos, features, reviews, and videos

iPhone security / unlocking, hacking or breaking into iPhone
5G mobile wireless network

Ransomware

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

youtube thumbnails template 021020
video

How to prevent data loss on your network

Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

A firmware message appears on a circuit board.

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.

gears orange large efficient automated machine learning automation

5 hot network-automation startups to watch

Automating network processes can head off issues and speed resolution of problems while cutting the workload on IT pros.

deepfakes fake news unreal doctored malicious personal attack video audio

How blockchain could help block fake news

Creating an immutable ledger to track metadata associated with published content shows promise as a method for identifying authentic news.

Microsoft Windows 7 security patches/updates

Microsoft springs last-minute demand on buyers of Windows 7 after-expiration support

IT admins who signed up for Windows 7 post-retirement support found out there's a new prerequisite that has to be installed before they can download patches they've already paid for.

Computerworld > Mobile voting via phone / digital ballot

MIT researchers say mobile voting app piloted in U.S. is rife with vulnerabilities

The flaws could let a hacker alter, stop or expose how a person has voted.

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

youtube thumbnails template
video

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Why the Fed is considering a cash-backed cryptocurrency

A real-time payments infrastructure enabled by a blockchain-based stablecoin could offer many advantages, a Federal Reserve governor said during a recent speech.

Internet of think with padlock showing security

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing.

IDG Tech Spotlight  >  Security  >  Balancing security and innovation

Security vs. innovation: IT's trickiest balancing act

An innovative initiative is only as successful as it is secure. Here’s how CIOs are balancing risk-taking with risk aversion.

Load More