Security

Security | News, how-tos, features, reviews, and videos

7 safe browswer search legitimate url domains surfing the internet

Don't abandon that domain name

Penny-wise, pound-foolish: Letting old domain names expire might save a few bucks a year, but lets attackers register your old domain and pretend to be you.

network security digital internet firewall binary code

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

1 intro security executive thinking woman face binary

12 things every IT security professional should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.

zuckerberg mark cutouts capitol

Here comes ‘antidisinformation as a service’

Lies and fake news are coming after your company’s brand and reputation. Time to get your AaaS in gear.

Bitcoin banned against a Chinese flag.

China once again cracks down on cryptocurrencies, news outlets

The Chinese government has banned more than a half dozen online media outlets after they published information on cryptocurrencies, and a regional government authority clamped down on all venues hosting crypto events.

Movie preview test pattern
Updated

Best security software: How 18 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories.

Globe with orbiting speech bubbles containing world flags, sitting on the edge of a laptop.

Traveling to China for work? Punch through the Great Firewall and securely connect with your home office

Security is not just about confidentiality and integrity. It's also about availability. The new partnership between Wickr and Psiphon is worth a look for global enterprises with traveling employees.

bucket with holes breach security vulnerability

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month,...

10 cloud security breach virtualization wireless

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

TradeLens supply chain shipping blockchain

IBM, Maersk launch blockchain-based shipping platform with 94 early adopters

After testing it earlier this year, the two companies announced scores of early adopters have agreed to pilot the distributed ledger technology, enabling them to track shipments in near-real time.

network / data center

What is Nmap? Why you need this network mapper

While there is a wealth of monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

pc antivirus

The best antivirus software? Kaspersky, Bitdefender and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

credit cards

Hack mobile point-of-sale systems? Researchers count the ways

Security researchers uncovered widespread vulnerabilities in mobile point-of-sale readers offered by Square, SumUp, PayPal and iZettle.

mobile apps crowdsourcing via social media network [CW cover - October 2015]

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

security trust

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue.

Facebook / network connections / privacy / security / breach / wide-eyed fear

Does Facebook even need a CSO?

Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.

binary code, magnifying lens, skull and crossbones

What is malware? Viruses, worms, trojans, and beyond

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

phishing threat
Awareness

What are phishing kits? Web components of phishing attacks explained

A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

An armored knight armor with halo and wings holds a shield, layered in Microsoft brand colors.

How Microsoft became tech’s good guy

Even if it’s doing so out of self-interest, the company has been acting as a force for good.

Load More