Security

Security | News, how-tos, features, reviews, and videos

IoT / Internet of Things / wireless network devices / mapping connections
Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

rawpixel com 296621 unsplash

Download Malwarebytes Today and Protect Your Data for Free

This innovative cybersecurity software helps you fight hackers, and it’s free.

nvidia t4 gpu

GPUs are vulnerable to side-channel attacks

Researchers at UCLA Riverside discover GPUs can be victims of the same kinds of attacks as Meltdown and Spectre, which have impacted Intel and AMD CPUs.

screen shot 2018 09 21 at 10.43.22 am

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year.

Tablet with lock showing secure encryption

What is Transport Layer Security (TLS)?

Transport Layer Security (TLS), a cryptographic protocol that provides end-to-end communications security over networks, including the internet, has been improved in TLS 1.3.

free wifi secure network public wifi chain links

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade

The Wi-Fi Alliance has introduced the first major security improvement to Wi-Fi in about 14 years: WPA3. The most significant additions to the new Wi-Fi security protocol are greater protection for simple passwords, individualized...

firewall

What is a firewall? How they work and all about next-generation firewalls

Firewalls are the primary perimeter defense for most organizations that have gone through many iterations: proxy, stateful, Web app, next-generation

farmer tractor

Right-to-repair smartphone ruling loosens restrictions on industrial, farm IoT

Forget smartphones — the U.S. Copyright Office’s new DRM exemptions could be a big deal for farmers and other heavy equipment operators and vendors.

firewall network security lock padlock cyber security

The best enterprise level firewalls: Rating 10 top products

How do you choose the best firewall? This 37-page downloadable report features reviews from hundreds of network security pros who have used the products in real-world situations.

thumbnail
video

How to use the Shodan search engine to secure an enterprise's internet presence

Shodan, a search engine for all ports within the internet, can help enterprises identify and lock down security vulnerabilities. Senior writer J.M. Porup and content producer Juliet Beauchamp talk through the security scenarios.

ipsecurity protocols network security vpn3

ICANN’s internet DNS security upgrade apparently goes off without a glitch

The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts...

thumbnail
video

Talking DerbyCon, spy chip whispers and Google's data breach | Salted Hash Ep 47

Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data...

thumbnail
video

Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49

Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.

thumbnail2
video

How secure are electronic voting machines? | Salted Hash Ep 48

With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet...

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

padlock on ethernet cables for secure network

Identity awareness: it’s more than just a packet

Routing must reflect business context.

brain team iot analytics

Cisco sets $2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

patching against ransomware

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS...

1 network internet connected grid earth power satellite view

ICANN sets plan to reinforce internet DNS security

ICANN has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).

Load More