Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

intro
083016 ornl aircraft measure

open source keyboard

Defense Department needs to embrace open source or military will lose tech superiority

A report by the Center for a New American Security warns that if the DoD doesn't embrace open source, it will be "left behind."

adobe san jose

Adobe patches critical vulnerability in ColdFusion application server

Adobe Systems released critical security patches for its ColdFusion application server which has been a target for hackers in the past.

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics, and flexible remediation to business networks

Delta airlines delay

Lessons from high-profile IT failures

What we can learn about disaster recovery and high availability from recent airline outages.

pokemon go mexico

How to keep viral memes from spreading malware in your enterprise

CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime...

dropbox logo sign

Dropbox changed passwords after 68M account records were compromised

Dropbox’s move last week to ask users who had signed up before mid-2012 to change their account passwords followed the discovery of a dump of some 68 million email addresses and passwords.

todd mckinnon oktane15

Okta's API access product targets the trend toward services

Okta has changed key parts of its product portfolio to attract new users to its corporate identity management and access control platforms. The startup is launching a new API access management product and revamping its provisioning...

misunderstood contracts disagreement argue blame

5 commonly misunderstood compliance terms

Understanding the terms is critical given the complexity of compliance, and will help you when analyzing the best technology solutions to manage compliance as a whole

OS X El Capitan installation

BitTorrent client is found distributing Mac-based malware

A popular BitTorrent client called Transmission has again been found distributing Mac-based malware, months after it was used to spread a strand of ransomware.

diane greene oktane

Okta partners with Google to secure cloud identities

Okta and Google have announced a partnership aimed at getting enterprises to secure their users' identities in the cloud.

security code big data cyberespionage DDoS

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.

mcchicken

Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL

Facebook took human editors out of the equation, in favor of AI, and its Trending algorithm immediately served up fake, disturbing and rude Trending news.

Digital Key, security, encryption

New ransomware threat deletes files from Linux web servers

A destructive ransomware program deletes files from web servers and asks administrators for money to return them, though it's not clear if attackers can actually deliver on this promise.

1 intro

What to look for in endpoint detection and response tools and services

Today’s cyberattacks are more advanced and aggressive than ever before. Organizations are quickly learning that keeping the bad guys out of an enterprise environment isn’t as simple as deploying firewalls and antivirus. As...

WhatsApp (1)

Privacy groups complain to FTC about WhatsApp policy changes

Privacy groups in the U.S. have complained to the Federal Trade Commission that changes last week in WhatsApp’s terms and privacy policy break its previous promise that user data collected would not be used or disclosed for marketing...

4120913056 d1931898b4 o

Hackers had a chance to hamper voting by deleting records

A U.S. cybersecurity monitor has uncovered more breaches of election agencies on top of attacks described in an FBI report leaked on Monday.

book safe

45% off Dictionary Hidden Book Safe With Lock - Deal Alert

This very realistic looking dictionary conceals a locking solid steel safe for creatively hiding away your money, prescription bottles, jewelry, small electronics and more. Currently discounted 45%.

Cybersecurity and VMworld

What is VMware’s role in security and how is it impacting cybersecurity professionals and the industry? This week’s VMworld will tell the tale.

Load More