Security

Security | News, how-tos, features, reviews, and videos

intro security vulnerability

Researchers warn of unpatched vulnerability in Oracle WebLogic Server

Detected scans suggest attacker are seeking vulnerable servers to target for attacks.

Movie preview test pattern
Updated

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

FedEx blockchain

FedEx CIO: It’s time to mandate blockchain for international shipping

With governments calling on manufacturers and shipping companies to more closely guard their chain of custody as parts and products move between borders, FedEx sees a single, standardized ledger as common sense.

android anti virus security

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features.

170227 mwc 02722

Huawei controversies timeline

Chinese telecommunications and consumer electronics manufacturer Huawei has found itself at the centre of a long list of controversies in recent months. Far and away the leader in 5G network infrastructure, the company's business...

skull and crossbones in binary code

GandCrab attackers exploit recently patched Confluence vulnerability

If your company uses Confluence, make sure you have the latest available patches for this vulnerability.

A computer monitor displays code and a pixelated skull.

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities.  Cisco Talos security researchers, who...

Apple security illustration

Apple edges closer to cursory code review for all Mac apps

In a message to developers, the company said it will soon require all macOS apps to pass at least a cursory review before they can be downloaded and run by users.

title slide san francisco san antonio israel

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

compliance compliant regulation rules stamp gdpr

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

compromised data / security breach / vulnerability

Cisco warns WLAN controller, 9000 series router and IOS/XE users to patch urgent security holes

Cisco says unpatched vulnerabilities could lead to DoS attacks, arbitrary code execution, take-over of devices.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems

mobile device management

Google, Hyperledger launch online identity management tools

The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.

broken chain metal link breach security

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.

big brother privacy eye data breach security binary valerybrozhinsky getty

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk?

6 industrial iot oil rig oil drilling cranes

Group behind TRITON industrial sabotage malware made more victims

The attackers stayed undetected on the victim's network for more than a year and sought out operational technology networks.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 6

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 7

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

qpahy9p 4

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features.

Load More