Skip Links

Security Breaking News

  • How a cyber cop patrols the underworld of e-commerce
    Melissa Andrews, a resident of Canada, is a cyber security "cop" for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described by the company's public relations firm as "the worst security job on the Internet," is to protect the public from illegal, and many times revolting, content, by shutting the sites down and alerting authorities about criminal activity. She spoke with CSO this week about her job and why she is proud of what she does.
  • Heartbleed flaw affects mobile apps, too
    Android and IOS mobile applications are just as vulnerable to the Heartbleed bug as websites are, security vendor Trend Micro warned.
  • Heartbleed (CVE-2014-0160): An overview of the problem and the resources needed to fix it
    After only a few days, the Internet is still buzzing with news surrounding CVE-2014-0160, better known as the Heartbleed vulnerability. CSO has compiled the following information in order to help administrators and security teams understand the issue, determine their risks, and if needed, fix the problem.
  • In Heartbleed's wake, Comodo cranks out fresh SSL certificates
    Tens of thousands of new digital certificates have been issued by Comodo in the wake of the "Heartbleed" security flaw, which has put Internet users' data at risk.
  • What you need to do about Heartbleed
    The Heartbleed bug has affected about two-thirds of the world's websites, meaning virtually everyone should be taking steps to protect themselves now.
  • ATM malware, controlled by a text message, spews cash
    A group of enterprising cybercriminals have figured out how to get cash from a certain type of ATM -- by text message.
  • RSA Conference mobile app has vulnerabilities, researchers say
    A mobile application designed to make it easier for RSA Conference 2014 attendees to navigate the event and interact with their peers exposes personal information, according to researchers from security firm IOActive.
  • Nov'IT says flashing a new ROM onto your Android phone can make it more secure
    Rooting your Android phone and flashing it with a new ROM -- a different version of the OS -- is usually accompanied by dire warnings from the manufacturer and occasionally even the supplier of the ROM image that it can make your phone less secure. Nov'IT, exhibiting at Mobile World Congress this week, says that its ROM will help keep your data and communications safe from prying eyes.
  • Mastercard and Syniverse protect against card fraud with phone geolocation
    Mastercard and roaming infrastructure company Syniverse have come up with a way to protect credit card transactions abroad with help from a phone's location.
  • Blackphone plans more secure devices, bouyed by Snowden leaks
    Blackphone, the Swiss start-up that's launching a smartphone with encrypted communications, is planning a series of devices around the same idea, one of the company's co-founders said on Monday.
  • California bill proposes mandatory kill-switch on phones and tablets in 2015
    Politicians and law enforcement officials in California will introduce a bill on Friday that requires all smartphones and tablet PCs sold in the state be equipped with a digital "kill-switch" that would make the devices useless if stolen.
  • Why I did it: Former hacker Mitchell Frost explains his motivation
    In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including, and Rudy Giuliani's campaign site, He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted by the university.
  • Inside knowledge likely in Target breach, experts say
    How did what is likely to be one of the largest data breaches in history occur? Some speculate it was only possible with insider knowledge
  • The 8 hottest security stories of 2013
    We recap the biggest security news from this past year
  • The top 8 security threats of 2013
    The past year has seen its share of newly emerging or persistent threats that security and IT executives need to be aware of and in many cases defend against.
  • New website lets users check if their online credentials were exposed in large data leaks
    A new website allows Internet users to check if their usernames and passwords were exposed in some of the largest data breaches in recent years.
  • Why CIOs stick with cloud computing despite NSA snooping scandal
    Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
  • Tesla Model S vulnerable to hackers, kind of
    It’s the curse of the connected car – once it’s linked to the Internet, it’s, well, on the Internet. In the case of the Tesla Model S, this means that malicious hackers could, in theory, control some functions of the vehicle and even track it without the owner’s knowledge.
  • Failed data feed system shutters Nasdaq trading
    Nasdaq's unprecedented trading halt today stemmed from a technical glitch with a core data feed that disseminates market data for Nasdaq-listed securities.
  • Google increases rewards in bug bounty program
    Announcing a new milestone on Monday, Google says that they've paid out nearly $2M in bounties to security researchers who have disclosed bugs in Chromium. To celebrate, the search giant is boosting their reward scheme, offering even more money for the discovery of future bugs.
  • Put an Umbrella over your endpoint devices to stop malware, botnets and phishing
    Did you know that malware and botnet detection spikes 200% every Monday? The OpenDNS Umbrella Security Service is designed to to put an end to Malware Mondays.
  • 10 Hot Security Startups to Watch
    Tablets and smartphones, which employees are bringing into work in “Bring Your Own Device” (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It’s all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it’s not just mobile spurring the creation of young security firms out to change the world.
  • Civil rights groups plan July 4 protest against NSA surveillance
    A large coalition of civil rights and privacy groups and potentially thousands of websites will stage protests on the Fourth of July to protest surveillance programs at the U.S. National Security Agency.
  • 12 tips for SDN IT buyers
    Software defined networking (SDN) offers significant opportunities and challenges for enterprise IT professionals. SDN has the potential to make networks more flexible, reduce the time to provision the network, improve quality of service, reduce operational costs and make networks more secure.
    Software has been programming our networks for a long time, so how is SDN different?
Latest News
rssRss Feed
View more Latest News