Taylor Armerding

Contributing writer

Too many victims say yes to ransomware

Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

Can the FTC save the IoT?

Can the FTC save the IoT?

Enormous amounts of effort, time and money haven’t made much of a dent in the insecurity of the Internet of Things. So, what about making more use of the old-fashioned lawsuit? The Federal Trade Commission is having some impact with...

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

Obama’s cybersecurity legacy: Good intentions, good efforts, limited results

President Obama declared early in his presidency that cybersecurity was a priority. Most experts agree he delivered a significant effort. But they also agree that the effort didn’t deliver better security.

Repealing passwords is a long way away

Repealing passwords is a long way away

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

Can government really fix the IoT mess?

Can government really fix the IoT mess?

The Internet of Things is an ever-expanding attack surface. And a growing number of experts note that the market has failed to address that problem. They are now saying it will take government intervention.

Medical data: Accessible and irresistible for cyber criminals

Medical data: Accessible and irresistible for cyber criminals

Health care data may not fetch the highest price on every Dark Web marketplace. But it remains one of the most popular targets for cyber criminals, in part because it is easy to get and retains its value. You can’t change a Social...

Top 15 security predictions for 2017

Top 15 security predictions for 2017

So here are some of the best guesses about what we will see in 2017 from several dozen vendors and analysts. There are many more than 15 predictions out there, of course, but these are the ones we heard most frequently.

The IoT: Gateway for enterprise hackers

The IoT: Gateway for enterprise hackers

The Internet of Things keeps growing – and so do the threats. At a webinar this week, a panel warned enterprises that it is crucial to be able to see radio-enabled devices on the network, or they could be blind to the risks they pose....

Ransomware as a Service fuels explosive growth

Ransomware as a Service fuels explosive growth

Ransomware as a Service has made the entry into the world of cyber crime cheap and easy. Meanwhile, people and organizations still aren’t protecting themselves. No wonder it is exploding.

Feds provide legal loophole to hacking IoT devices

Feds provide legal loophole to hacking IoT devices

For the next two years, “good-faith” security researchers will be allowed to hack into the software of most Internet of Things devices without risk of violating copyright laws. Whether that will lead to more cooperation or...

Is critical infrastructure the next DDoS target?

Is critical infrastructure the next DDoS target?

DDoS attacks are vastly bigger now, thanks to botnets composed of Internet of Things devices. A recent attack that took down a portion of the internet has led to questions about whether something similar could shut down critical...

Bots may be trumping online polls

Bots may be trumping online polls

Poll results are supposed to be driven by opinions, but marketers, politicians and others know opinions can be driven by polls. Hence the rising use of bots to skew perceptions in favor of a product, a celebrity or, at this time of...

The OPM breach report: A long time coming

The OPM breach report: A long time coming

Congress has finally issued a report on the breach of the federal Office of Personnel Management that exposed the personal information of more than 22 million current and former employees. It comes 15 months after the breach was made...

Taking down the internet: possible but how probable?

Taking down the internet: possible but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

Security vs. privacy: The endless fiery debate continues

Security vs. privacy: The endless fiery debate continues

The debate about security vs. privacy has been going on since governments existed. It got a lot of discussion this week at the Cambridge Cyber Summit, but it remains unresolved.

Hillary Clinton’s email has vanished but why can’t yours?

Hillary Clinton’s email has vanished but why can’t yours?

Experts agree that recent high-profile cases demonstrate that emails can be permanently destroyed. But they also warn against complacency. They still recommend treating emails as if they really are “forever.”

Awareness training: How much is too much?

Awareness training: How much is too much?

The goal of security awareness training is to help employees recognize and avoid security risks. The key, experts say, is to make them skeptical but not operate in a “constant state of distrust.”

Hack the vote: Experts say the risk is real

Hack the vote: Experts say the risk is real

This nation’s fragmented electronic voting systems are dangerously vulnerable to cyber attacks, security experts agree. And while they don’t predict direct tampering with votes in the coming election, they say uncertainty about...

Regular password changes make things worse

Regular password changes make things worse

Changing passwords is supposed to make things more difficult for attackers. Unfortunately, research shows that human nature means it makes it easier.

Snowden and Huang hope to help smartphones go dark

Snowden and Huang hope to help smartphones go dark

NSA whistleblower Edward Snowden and superstar hacker Andrew “bunnie” Huang are working on a device that will let journalists know if their phones are betraying them.

Load More