Security

Security | News, how-tos, features, reviews, and videos

intro security vulnerability

Cisco warns a critical patch is needed for a remote access firewall, VPN and router

Cisco is warning organizations with remote users using a particular wireless firewall, VPN and router to patch a critical vulnerability in each that could let attackers break into the network.

skull and crossbones in binary code

Elasticsearch clusters face attacks from multiple hacker groups

If you are running an older version of Elasticsearch, make sure you've patched its known vulnerabilities or consider upgrading.

Movie preview test pattern
Updated

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

hottest products at rsa 2019 title slide

Hottest new cybersecurity products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out.

botnet bots

What is a botnet? And why they aren't going away anytime soon

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to...

5 password best practices unique passwords authentication

Password managers remain an important security tool despite new vulnerability report

Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.

domain name system dns security data center lock icann

ICANN urges adopting DNSSEC now

Continuing attacks on directory name services have prompted ICANN to prompt enterprise DNS uses to push their suppliers for DNSSEC services to block some of these attacks that can compromise corporate data.

Windows security and protection [Windows logo/locks]

Microsoft opens top-tier Defender ATP security to Windows 7 PCs

Windows Defender ATP, which can detects ongoing attacks on corporate networks and recommend a response, is now available for Windows 7 and 8.1.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

Smile, you are on camera

Get ready for the age of sensor panic

Cameras, microphones and other sensors are showing up everywhere. And this is just the beginning.

Mobile security

7 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year.

3 patch training update software band aid laptop with virus binary

Cisco warns on HyperFlex security vulnerabilities

Weaknesses in Cisco's HyperFlex hyperconverged data-center gear could allow command-injection exploits.

capitol dome congress

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

botnet

IoT botnets target enterprise video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk.

windows 7 logo in the rear view mirror

Microsoft delays Windows 7's update-signing deadline to July

The company's plans to move away from SHA-1 to SHA-2 for digital signatures for OS updates has been pushed back to mid-year.

vulnerable cryptojacking hacking breach security

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge.

headache man

The 11 biggest issues IT faces today

From securing IoT to retraining IT talent to finding new revenue streams, CIOs have more than their share of concerns keeping them up at night.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

intro data breach circuit board technology security

Data breaches exposed 5 billion records in 2018

New report from Risk Based Security shows a downward trend in number breaches and exposed records, Unclear if privacy regulations like GDPR are having an effect.

Load More