Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

data spill leak
microsoft stock campus building

hidden eggs

How to protect sensitive data and limit risk of data exposure or leaks?

The average cost per record is $158 whereas the cost per record breached ranges from $355 to $129 for healthcare and retail industry respectively. Despite the high risk of the threat, enterprises continue to fall victim to data...

credit card fraud

Fraud rises as cybercriminals flock to online lenders

The latest quarterly ThreatMetrix Cybercrime Report shows 1 million cyberattacks targeted online lending transactions throughout 2016, causing estimated losses of more than $10 billion.

verizon sign

Verizon's risky business: Acquiring the world's biggest hack

Verizon's biggest risk is acquiring Yahoo, victim of the biggest hack ever.

crossing sign

Stop using SHA1: It’s now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature.

customer service telemarketing

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support.

fraud infog primary

Has fraud met its match?

New and dynamic authentication factors can help prevent identity theft. The idea of using a fingerprint reader to log on to a smartphone is nothing new, but the latest wrinkle is the pressure with which that finger pushes on the...

digital data surveillance eye

The future of biometrics and IoT

Many people are familiar with biometrics as a security measure at airports or police stations, where they often use a fingerprint as a form of identification, but there are many other uses outside of law enforcement.

data spill leak

Bleeding clouds: Cloudflare server errors blamed for leaked customer data

While working on something completely unrelated, Google security researcher, Tavis Ormandy, recently discovered that Cloudflare was leaking a wide range of sensitive information, which could have included everything from cookies and...

Uber
video

Breaking and protecting devops tool chains

Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains.

Still
video

Bruce Schneier and the call for "public service technologists"

Bruce Schneier, CTO of IBM Resilient on the increasing importance of technologist's presence in education and policy-making.

Security online

Eleven-year-old root flaw found and patched in the Linux kernel

Linux system administrators should watch for kernel updates for their distributions and apply them as soon as possible because they fix a local privilege escalation flaw that could lead to a full system compromise.

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

germany flag

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

cso50 intro

The evolving role of the chief security officer

Today's Chief Security Officers (CSO) are charged with mitigating an array of interdisciplinary and intersecting risks across the enterprise. The CSO role is evolving into a mission-critical service that spans risk areas ranging from...

20140926 campus indoors 004 1

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Healthcare firms plan to increase security spending

After several high-profile breaches over the past couple of years, the healthcare industry plans to increase its spending on IT security more than other sectors.

RSA Expo North Hall

Salted Hash: RSAC 2017 Recap

Last week, Salted Hash was in California for the annual RSA Conference in San Francisco. The week was full of drama between the testing labs and endpoint protection firms, but aside from that we managed to have a few interesting...

connected cars 10

Are you afraid your car will be taken over?

A consortium was recently created to make sure that your car stays on the road and in your control.

Load More