Security

Security | News, how-tos, features, reviews, and videos

screen shot 2018 09 21 at 10.43.22 am
aerial view of pentagon government security dv1282020

1 network internet connected grid earth power satellite view

ICANN sets plan to reinforce internet DNS security

ICANN has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Computerworld > Mobile voting via phone / digital ballot

W. Va. to use blockchain-based mobile app for mid-term voting

The state will be the first ever to use a blockchain-enabled mobile voting app – developed by Voatz – to allow absentee voters to cast ballots in the mid-term elections this fall.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

risk assessment - safety analysis - security audit

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

botnet bots

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

intro data breach circuit board technology security

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact.

intro security vulnerability

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

linus torvalds

Linus Torvalds: Changes in hardware change Linux development

Bugs are getting more esoteric, and hardware isn’t getting faster at the same pace it used to

1 weakest link broken rusted chain security breach hacked

What to expect when the internet gets a big security upgrade

More secure keys protecting the directory name system (DNS) are ready to deploy, but for those using DNS servers that haven't been upgraded, it could cause problems reaching websites.

lock binary circuits

Do you still need a firewall?

Traditional firewall software no longer provides meaningful security, but the latest generation now offers both client-side and network protection.

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

template c100.00 01 59 12.still001
video

VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45

In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

android anti virus security

Best Android antivirus? The top 12 tools

There are plenty of antivirus tools for Android. Here's how the top 12 measure up in protection, usability and features.

ransomware wannacry

What is WannaCry ransomware, how does it infect, and who was responsible?

Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

vmware vmworld sharpen focus

VMware sharpens security focus with vSphere Platinum, ‘adaptive micro-segmentation’

VMware expands its security range with vSphere Platinum -- a new version of its virtualization software that has security integrated into the hypervisor.

Load More