Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

hybrid cloud

Many Organizations Still Opt for “Good Enough” Cybersecurity

Apathy, budget shortages, and the cybersecurity skills shortage lead to a constant wave of security incidents


2 online banking

New game, new rules: 3 steps to secure your bank in the digital age

The cybersecurity risks facing banks come as a result of three key issues, all related to a bank’s most important asset: data.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

intro

New products of the week 1.23.17

Our roundup of intriguing new products from companies such as Acronis and Bugsee.

best home security cameras
Clear Choice Tests

6 steps to secure a home security camera

No device is 100 percent immune from vulnerabilities, but there are some simple, common-sense steps you can take to protect IP-based cameras.

security cameras secure
Clear Choice Tests

REVIEW: Home security cameras fall short on security

In tests of 7 IP-based cameras, only Canary passed muster.

Tattered US flag

Admin of anonymous, Tor-friendly email service has electronics seized at U.S. border

Should running an anonymous email service mostly used by 4chan or attending hacker conferences mean you should be detained by customs and have your electronic devices seized?

img 20170120 171638 01

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging.

ransomware hardware security embedded circuit board integrated controller

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University have proposed a model that uses patients' heartbeats as an encryption key for electronic records.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Steven Mnuchin

Trump nominee suggests IRS cybersecurity and staffing boosts

Steven Mnuchin, a former CIO and executive vice president for Goldman Sachs, told senators on Thursday that he is “very concerned about the lack of first-rate technology at the IRS” as well as staff cuts in recent years.

screen shot 2017 01 20 at 10.36.38 am

Spanish police nab suspected hacker behind Neverquest banking malware

Spanish police have arrested a suspected Russian hacker of developing the Neverquest banking Trojan, a malware targeting financial institutions across the world.

Android apps (2)

Google pushed developers to fix security flaws in 275,000 Android apps

Over the past two years, Google has convinced developers to patch security issues in over 275,000 Android apps hosted on its official app store.

scream wheelbarrow nightmare

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

01 fortified

How fortified is your SAP against security breaches?

Can you even tell if a breach has occurred? Have you inventoried its vulnerabilities - and taken steps to prevent, for example, a $22 million per minute loss due to a SAP breach? Ask yourself these 10 questions to find out if your SAP...

Legal law gavel hammer courts

Microsoft’s standing to sue over secret US data requests in question

Microsoft’s lawsuit objecting to the indiscriminate use by U.S. law enforcement of orders that demand user data without the opportunity to inform the customer may run into questions about the software giant's standing to raise the...

assange on balcony

Assange seeks to discuss his US extradition with the feds

WikiLeaks founder Julian Assange said he stands by an earlier pledge to face trial in the U.S., but he is first urging federal investigators to name the exact charges against him.

deception hack hacker phishing tricked

Air Force goes after cyber deception technology

The Air Force Research Lab (AFRL) tapped into that notion today as it awarded a $750,000 grant to security systems developer Galois to develop a cyber deception system that will “dramatically reduce the capabilities of an attacker...

20160225 stock mwc ericsson booth security locks

Encrypted email service ProtonMail is now accessible over Tor

The creators of encrypted email service ProtonMail have set up a server that's only accessible over the Tor anonymity network as a way to fight possible censorship attempts in some countries.

Load More