Security

Security | News, how-tos, features, reviews, and videos

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

hunting and monitoring security threats

Burned malware returns, says Cylance report: Is Hacking Team responsible?

Burning malware forces attackers to evolve, not go away. Network defenders take note.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

Microsoft Windows 10 logo bandage data map
Updated

Best new Windows 10 security features: More patching, updating flexibility

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1809 feature release.

7 safe browswer search legitimate url domains surfing the internet

Big browsers to pull support plug for TLS 1.0 and 1.1 encryption protocols in early '20

TLS is the successor to the better-known SSL (Secure Socket Layer) encryption protocol; both are used to secure data communications between browsers and the destination server.

supply chain management problems in need of solutions

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

bitcoin blockchain cryptocurrency scam fake currency falling apart

Economist Nouriel Roubini: Blockchain and bitcoin are the world’s biggest scams

The economist who predicted the 2008 financial collapse has been telling congressional leaders that bitcoin and blockchain represent a significant threat to the stability of the financial marketplace. But he's getting pushback.

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

pc antivirus

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'

Facebook and Google recently owned up to new data breaches affecting millions of users. It's not the first time. It won't be the last. CSO's J.M. Porup explains what's really going on.

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

Broken window with Windows 10 logo

What the heck is it with Windows updates?

Lately, it’s been difficult to update Windows systems without running into some showstopping bugs. WTH is going on?

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

brain team iot analytics

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

patching against ransomware

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS...

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

Movie preview test pattern
Updated

Best security software: How 20 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software.

Load More