Security

Security | News, how-tos, features, reviews, and videos

medical network h/ ealthcare IoT / hospital connections and communications
hacker / cryptocurrency attack

hacker presence on a network

Cisco issues firewall, SD-WAN security warnings

The warning about Cisco Firepower management software is rated critical among 26 other less urgent security advisories it issued.

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent...

youtube thumbnails template
video

How to prep for Windows 7, Server 2008 end of life

Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.

iPhone security / unlocking, hacking or breaking into iPhone

Feds may already have found a way to hack into Apple iPhones

By refusing to put a permanent backdoor in its iOS platform, Apple wants to protect millions of users from future threats by both governments and hackers, privacy advocates said.

Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

US elections remain vulnerable to attacks, despite security improvements

Continued Russian interference, insecure paperless voting processes will sow doubt about the next election despite some security improvements.

Brexit / GDPR  >  Cutting connections / United Kingdom / European Union / global security shield

What the Brexit Withdrawal Agreement Bill means for data protection and the GDPR

Boris Johnson's Withdrawal Agreement Bill (WAB) largely leaves existing data protection regulation in place, but changes are still possible.

cybersecurity  >  information security / data protection / lock / shield

What is information security? Definition, principles, and jobs

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.

cryptocurrency blockchain digital financial security by just super getty

Kadena launches a hybrid platform to connect public, private blockchains

The JP Morgan startup's blockchain braids together multiple interoperable chains via smart contracts over which users can transact business via cryptocurrency.

securitycamera hub image 2019
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

youtube thumbnails template 2
video

3 easy ways to make your Windows network harder to hack

Start the new year off by eliminating common paths for attackers to breach your network.

windows 7 logo on mirrors man with derby hat on dock

Microsoft to Windows 7: Beat it, you bum

In case the message isn't clear, Windows 7 PCs will soon show a full-page nag screen reminding users that they could fall victim to cyber criminals by running unpatched software.

windows 7 logo in the rear view mirror

Seven high points of Windows 7

What a long ride it's been for Microsoft's popular OS. Support for Windows 7 ends today, making this a good time to look at the highs and lows of its lifetime.

win7pro logo 3x2

Saying goodbye to Windows 7 isn’t easy, but you must

One in five Windows users is still using Windows 7. That’s one too many. It’s time to move on.

network variables + dynamics / digital transformation

How to deal with the impact of digital transformation on networks

To unleash the promise of digital transformation, businesses need to embrace automation and software-defined networking as well as improve security.

Digital Transformation [DX]  >  dandelion seeds blown by a virtual wind of change

The state of digital transformation in 2020

The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.

Lock with a question mark-shaped keyhole in a network of circuits + binary / digital transformation

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.

mozilla firefox primary

Mozilla patches Firefox zero-day as attackers exploit flaw

The release of Firefox 72.0.1 came just one day after the newest version of the browser rolled out and fixes a type confusion bug in the IonMonkey JavaScript JIT (Just-in-Time) compiler of SpiderMonkey.

youtube thumbnails template
video

How to fix insecure LDAP binds

Prevent Windows admin credentials from being exposed in cleartext with this tip.

Load More