Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

6 updating security software

Report: Top 25 IT security products

Download this exclusive report highlighting 25 top security products – as rated by actual enterprise users of the products – in categories such as cloud security, firewalls, SIEM, application security and IoT security.

10 phishing

Russian hackers use OAuth, fake Google apps to phish users

The Russian hacking group blamed for targeting U.S. and European elections has been tricking victims into handing over login credentials with fake Google security applications.

owasp

Contrast Security responds to OWASP Top 10 controversy

Contrast Security has addressed the recent backlash over section A7 of the OWASP Top 10 list for 2017. The company issued a statement on the matter after industry professionals suggested the A7 addition was an example of a vendor...

Open Source sign in yellow field against blue sky

Open source security risks persist in commercial software [Infographic]

Black Duck’s second annual Open Source Security and Risk Analysis report shows that commonly used infrastructure components have high-risk vulnerabilities.

karate training

How your company needs to train workers in cybersecurity

Businesses are being urged to train their workers to be more vigilant than ever to protect passwords and sensitive data and to recognize threats.

federal trade commission building ftc

Why we need the FTC to police ISP privacy practices

The move to scrap the FCC's rules for ISPs leaves the industry without any federal oversight and puts internet privacy at risk.

screenshot hipchat login

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

mobile gaming phone woman

R2Games compromised again, over one million accounts exposed

Online gaming company Reality Squared Games (R2Games) has been compromised for the second time in two years, according to records obtained by the for-profit notification service LeakBase. The hacker who shared the data with LeakBase...

1 buying decision

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

women in red shirt looking frustrated at laptop

Customers roast Microsoft over security bulletins' demise

Users fume over extra time and effort added to their workloads because of the switch.

prisoner jail crime

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from U.S. businesses by infecting their point-of-sale systems with malware.

hacking cybercrime cybersecurity internet coding programming code

There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

apple fake phishing

Phishing attacks using internationalized domains are hard to block

The latest version of Google Chrome restricts how domain names that use non-Latin characters are displayed in the browser in response to a recently disclosed technique that could allow attackers to create highly credible phishing...

hacker login password cliche

Three shoddy security tropes it's time to retire

It's not unusual for our collective cultural or technological understanding to discredit certain tropes over time. Tired cliches about shoddy security practices have been especially slow to be moved to the ash heap of history. Here...

Met museum puts new technologies on display

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

cloud security

10 interview questions for hiring cloud-literate security staff

The answers will paint a picture of whether this candidate understands cloud security.

Mac malware Apple

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug connected to the Stuxnet worm to carry out their attacks.

plastc card iphone

Secure card maker Plastc Inc. considering Chapter 7 bankruptcy, halts operations

Early supporters of Plastc, the E-Ink and touchscreen smart card that offered a number of security features, got some bad news on Thursday. Plastc Inc. is exploring options for Chapter 7 Bankruptcy protection, and none of the...

Load More