Security

Security | News, how-tos, features, reviews, and videos

Intel CPU  >  security

New CPU attack technique can leak secrets from Intel SGX enclaves

The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown.

backdoor / abstract security circuits, locks and data blocks

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say.

IDG Tech Spotlight  >  Containers + Virtualization [ CSO / March 2020 ]

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries.

IDG Tech Spotlight  >  Containers + Virtualization [ Network World / March 2020 ]

Essential things to know about container networking

Networking is a crucial component in the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts.

Intel CPU  >  security

Intel CSME flaw is unpatchable, researchers warn

Researchers reveal that a previously known Intel flaw is unpatchable and could allow attackers to compromise the cryptographic chain of trust in Intel systems.

binary eye circuits

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures.

sale 26564 primary image

Mitigate your risk of getting hacked with help from with this online academy

Learn the essentials for keeping hackers out of your data.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 8 tools

There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

Data breach  >  open padlock allowing illicit streaming data collection

Cisco security warnings include firewall holes, Nexus software weaknesses

Cisco details security vulnerability warnings with Firepower firewall (FXOS), Unified Computing System software and Nexus (NX-OS) switch operating system.

Cybersecurity  >  Attack warning / danger / security threat

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Desktop PC Illustration with a white umbrella and thunderstorm [cyber secruity/ cyber protection]

Firefox starts switching on DNS-over-HTTPS to encrypt lookups, stymie tracking

Mozilla hopes the change will stop criminals from intercepting traffic between its browser and a DNS server and then inserting bogus addresses pointing to a malicious site.

google account security google logo plus background by geralt via pixabay

10 steps to smarter Google account security

Give yourself some added peace of mind by giving your Google account a thorough set of security reinforcements.

Scripting code displays on a laptop in a dark room.

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.

RSA 2020's hottest products

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out.

mobile security

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cisco goes to the cloud with broad enterprise security service

Cisco describes the new SecureX service as offering an open, cloud-native system that will let customers detect and remediate threats detected across Cisco and third-party products from a single interface.

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper fills out its enterprise security portfolio, integrates support for its Mist wireless customers and gives customers better visibility and control over encrypted traffic threats.

iPhone security / unlocking, hacking or breaking into iPhone

Apple joins industry effort to eliminate passwords

Apple has joined a veritable who's who of tech vendors in the FIDO Alliance who see standardized, two-factor authentication as the way forward for device log-in.

5G mobile wireless network

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages.

Ransomware

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks.

Load More