Security

Security | News, how-tos, features, reviews, and videos

Russian flag overlay / mobile phone / wireless signals / data

Cell phones don't belong in SCIFs, says Republican congressman

Rep. Mike Rogers says his phone was infected by Russian malware three years ago. Also, why he believes we need fewer federal cybersecurity agencies and election laws.

product 24184 product shots1 image

Keep your data secure with a lifetime subscription to Ivacy VPN

It’s becoming increasingly easy for hackers to access everything from your email accounts to your credit card information with just a few lines of code, regardless of whether you’re browsing on a private network or public...

employee wellness predictions

Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies

Gartner’s top strategic predictions for 2020 and beyond is heavily weighted toward the human side of technology

secure system / network security policy management

Cisco issues critical security warning for IOS XE REST API container

This Cisco IOS XE REST API vulnerability could lead to attackers obtaining the token-id of an authenticated user.

product 28970 product shots1

Train to be a certified cyber security professional for just $39

This twelve-course bundle will show you ethical hacking and pen-testing techniques

Computerworld > Mobile voting via phone / digital ballot

Utah county moves to expand mobile voting through blockchain

Utah County plans to allow disabled voters to use a blockchain-based mobile app to vote in November, and one city hopes to use an app for all of its citizens, who are mostly young, tech-savvy millennials.

A weary businessman holds hand to forehead at his laptop, surrounded by abstract security concepts.

How enterprises can benefit from Cybersecurity Awareness Month

Organizations are working with the US Department of Homeland Security to enhance their own security awareness training and promote it in their communities.

Gears in the form of a cloud in a binary field  >  Cloud controls

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

Facebook headquarters

Can Facebook's Libra cryptocurrency survive the exodus?

Seven of the founding members of the Libra Association, Facebook's non-profit governing council for its planned cryptocurrency, have jumped ship amid increasing scrutiny by U.S. and European regulators.

cryptojacking / cryptocurrency attack

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.

Tor Browser  >  private / anonymous web browsing / binary onion

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

jet aircraft is maneuvering for landing 149957988

Report: China supported C919 airliner development through cyberespionage

Chinese hackers and intelligence agencies coordinated cyberattacks to gather intellectual property of aerospace firms to gain competitive advantage.

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

CSO  >  ransomware / security threat

GandCrab cousin Sodinokibi made a fortune for ransomware pushers

By tracking down bitcoin wallets, researchers estimate that the Sodinokibi creators pocketed at least $4.5 million.

secure elections / electronic voting / digital election data security / secure voting machines

VMware builds security unit around Carbon Black tech

VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.

security risk - phishing / malware / social engineering

Critical remote code execution flaw fixed in popular terminal app for macOS

Users of the iTerm2 terminal app are encouraged to update as soon as possible.

sale 20542 primary image

Get 2TB of fast and secure cloud storage for just $59

Enjoy lifetime access to your files from anywhere, at any time, and across your devices.

sale 20564 primary image

A lifetime subscription to VPN Unlimited is just $40

Protect up to five devices at once with no limitations placed on your speed or bandwidth.

Political data > Republican + Democratic mascots in a binary world

Presidential campaign websites fail at privacy, new study shows

A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues.

conference / convention / audience / applause / clapping

Speaker disinvites at CyberCon spark controversy

NSA whistleblower Thomas Drake and Australian academic Dr. Suelette Dreyfus disinvited from speaking at CyberCon a week before the conference.

Load More