Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

eye on computer monitor showing privacy security or breach
yahoo mail

nagini ransomware named after voldemorts pet snake

Ransomware roundup: Targeting servers and government, honoring Donald Trump and Voldemort

One ransomware targets servers, one goes after local and state governments and K-12 schools, and others honor Donald Trump and Voldemort.

gottfried leibbrandt ceo swift sibos 2016

Swift CEO reveals three more failed attacks on banking network

Banks stopped three new attempts to abuse the Swift financial transfer network this summer, its CEO Gottfried Leibbrandt said Monday, as he announced Swift's plan to impose tighter security controls on its customers.

ddos krebs

Security blogger Krebs says IoT DDoS attack was payback for a blog

Security blogger Brian Krebs says a massive DDoS attack that took down his Web site last week was likely the consequences for his outing of two Israelis who ran a DDoS-for-hire business.

00 intro

10 ways to secure a mobile workforce

As much as you might want to implement all the latest best practices and lock down your company like Fort Knox, you need to align your policies to your company culture.

red apple

How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

marblehead neck house by victor cruz

Always be prepared: Monitor, analyze and test your security

Critical Security Controls: Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20.

Yahoo

Yahoo's claim of 'state-sponsored' hackers meets with skepticism

Yahoo has blamed its massive data breach on a "state-sponsored actor". But the company isn't saying why it arrived at that conclusion. Nor has it provided any evidence.

bluetooth padlock

34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert

Use your smartphone to open this lock from Master Lock. Share access, monitor access history and receive alerts if someone is tampering. Its shackle offers 2 inch vertical clearance and is made of boron, offering maximum resistance to...

sofacy 1

New Mac Trojan uses the Russian space program as a front

Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry.

A shout out to Akamai for candor in IoT botnet attack

Akamai deserves credit for the way it disclosed why it stopped protecting the Krebs on Security Web site last week after defending it for three days from the largest botnet it had ever encountered.

nuclear bomb test bikini atoll mushroom cloud explosion detonate

The IoT is uranium

IoT devices are like uranium—as dangerous as post-Soviet era nuclear weapons.

security code big data cyberespionage DDoS

Armies of hacked IoT devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

illusive networks swift guard

Illusive Networks seeks to slow Swift attackers through deception

Today's savvy bank robbers don't break into vaults looking for gold or diamonds: They're more likely to be hacking networks looking for access to the Swift payment system.

Election 2016

The U.S. presidential candidates on technology, privacy issues

Where the 2016 U.S. presidential candidates stand on U.S. citizens’ privacy, open source software usage and Edward Snowden.

MailSniper

Meet MailSniper, a tool to search Microsoft Exchange emails for sensitive info

Meet MailSniper, a tool to help penetration testers search Microsoft Exchange emails for sensitive info.

id management

Why you should embrace SaaS ID management

Adopting single sign-on software to federate access to corporate applications is a key task priority for many CIOs seeking to make employees more efficient without sacrificing security.

microsoft dcu malware lab

Here's how Microsoft is using containerization to protect Edge users

Microsoft is aiming to better protect users and organizations from the threats that they face in the browser with a new feature called Windows Defender Application Guard. It's designed to isolate Microsoft Edge from the rest of the...

5 checklist

What’s in your code? Why you need a software bill of materials

When developers and suppliers carefully list the tools used to build an application and what third-party components are included, IT can improve software patching and updates

Load More