Security

Security | News, how-tos, features, reviews, and videos

United States Capitol Building / Congress / legislation in a digital landscape

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Cisco issues critical security warnings its Data Center Network Manager

Cisco warns of vulnerabilities that can let attackers issue arbitrary actions with administrative permissions.

exit sign expatriation cloud binary leaving the cloud

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

Industry 4.0 / Industrial IoT / Smart Factory / virtual display

Ultra Wideband (UWB) explained (and why it’s in the iPhone 11)

Ultra Wideband and IoT devices hold the promise of more precise location services as well as secure access to a myriad of systems. The technology, which has been around for years, is built into the latest iPhones.

CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features.

FireMon network security policy management
Updated

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market.

filling legacy tech skills gap

High-profile departures widen federal government’s security talent shortage

Recent key departures--voluntary and forced--might make it harder for government agencies to find the talent needed to fulfill their security missions.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

credit card hack financial breach stealing money traffiking financial data target by igphotography

Macy’s breach is a game-changing Magecart attack

The attackers customized the Magecart code to the Macy's website to steal credit card information in the wallet and new registrations.

Digitizing stylus input via tablet  >  writing / drawing / signatures

NHTSA odometer disclosure rule might pave way for e-signature authentication

The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics.

smart city - Industry 4.0 - industrial IoT internet of things - mobile wireless network

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails.

cockpit airline airplane control pilot by southerlycourse getty

Are we running out of time to fix aviation cybersecurity?

A new report from the Atlantic Council on aviation cybersecurity underscores the poor state of aviation security — and worse, how poorly understood the problem is within the industry.

virus specimen / world map / binary code

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Internet of Things (IoT) / security alert / wireless network management

Blockchain/IoT integration accelerates, hits a 'sweet spot'

IoT and blockchain may be a natural fit, but it will still take five to 10 years before kinks are worked out and the two technologies can reach their full potential, according to Gartner.

Vintage voltmeter gauge / binary code

Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves

By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory using the Plundervolt vulnerability.

Cryptojacking  >  Binary skull, code and bitcoin symbols invade systems as malware

Cryptominers and fileless PowerShell techniques make for a dangerous combo

This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes.

Quantum computing / security

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft to end updates to Windows 7's free AV software, Security Essentials

When support for Windows 7 ends on Jan. 14, Microsoft will also stop providing new malware signatures for its home-grown Security Essentials software.

data center / nuclear radiation symbol

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided.

Staring from a peak over cloud-covered landscape below  >  Mount Taranaki, New Zealand

What’s hot for Cisco in 2020

Experts expect that Cisco will focus on building-out cloud, SD-WAN and security in 2020.

Load More