Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

BlackBerry KEYone TCL Communications Nicolas Zibell
sha1 google

microsoft stock campus building

Google discloses unpatched IE vulnerability after Patch Tuesday delay

Google's Project Zero team has disclosed a potential arbitrary code execution vulnerability in Internet Explorer because Microsoft has not acted within Google's 90-day disclosure deadline.

13959900047 bede3e5ba4 o

FCC puts the brakes on ISP privacy rules it just passed in October

The new chairman of the U.S. Federal Communications Commission will seek a stay on privacy rules for broadband providers that the agency just passed in October.

digital transformation

Cisco unveils Hierarchy of Needs for the digital enterprise

Security, the cloud and automation are the foundation of Cisco’s Hierarchy of Needs, a guide to become a digital enterprise.

credit card fraud

Fraud rises as cybercriminals flock to online lenders

The latest quarterly ThreatMetrix Cybercrime Report shows 1 million cyberattacks targeted online lending transactions throughout 2016, causing estimated losses of more than $10 billion.

sha

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

security code big data cyberespionage byte

Cloudflare bug exposed passwords, other sensitive data from websites

For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.

analytics dish

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

ransomware data laptop

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support.

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

Digital Key encryption

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

How to assess security automation tools

Understanding the differences between the tools that promise to ease your security workload

New York State cybersecurity regulations: Who wins?

Encryption, IAM, SIEM and UBA vendors will benefit from New York State's new cybersecurity regulations for financial services organizations.

Uber
video

Breaking and protecting devops tool chains

Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains.

Still
video

Bruce Schneier and the call for "public service technologists"

Bruce Schneier, CTO of IBM Resilient on the increasing importance of technologist's presence in education and policy-making.

installed outlets cable types

Ethernet 2.5GBASE-T and 5GBASE-T grows, testing on tap from UNH lab

The University of New Hampshire InterOperability Laboratory (UNH-IOL) said it would begin offering testing and standards conformance services 2.5GBASE-T and 5GBASE-T Ethernet products. The broad testing services safeguard that...

Security online

Eleven-year-old root flaw found and patched in the Linux kernel

Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

dsc05783

Is DevOps security about behavior or process?

When adding security to DevOps, you have to start by changing developers' behavior. Then you can change the process and add tools.

Load More