Swiftkey
angry user wifi wi fibad connection

Android character at MWC 2014 Barcelona

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks.

point of sale credit card pci

EMV transition involves many moving parts

There's a lot of finger pointing going around about why the transition is going so slowly, but the bottom line, according to experts, is that the United States has a more complicated infrastructure than other countries and the...

black hat conference 2015

Black Hat: 9 free security tools for defense & attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

trump stump

Trump's hacking comment rattles the cybersecurity industry

Donald Trump’s muddled stance on hacking has disturbed security experts at time when the tech industry is looking for clarity on the U.S.'s cyber policy.

dnc congressional candidates

FBI said to investigate possible hack of another Democratic Party organization

The FBI is said to be investigating yet another suspected hack of a Democratic Party organization, this time of the Democratic Congressional Campaign Committee that raises funds for Democrats running for the House of Representatives.

edward snowden denmark

WikiLeaks' methods questioned by whistleblower Edward Snowden

Former National Security Agency contractor, Edward Snowden, has censured WikiLeaks’ release of information without proper curation.

best deals of week

Best Deals of the Week - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week. All items are highly rated, and dramatically discounted.

coding waves

The evolution of DevOps: the perfect storm for instituting secure coding practices

The nature of DevOps development approaches eases, invites, cries out for secure coding practices.

o2 meter

22% off iHealth Oxygen level, Pulse rate, and Perfusion Index Monitor - Deal Alert

This oximeter gives you gives you fast, accurate vitals sign readings. Measure, track, and share your blood oxygen level, pulse rate, and perfusion index right from your smartphone or tablet.

barbed wire fence

Court ruling shows the internet does have borders after all

J. Trevor Hughes, president & CEO of the International Association of Privacy Professionals (IAPP), explores the common misconception of an internet without borders.

code big data binary programming

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.

blackhat2013

A run down on Black Hat for security newbs

What to expect if it's your first security conference

Android N statue

Google beefs Linux up kernel defenses in Android

The future versions of Android will be more resilient to exploits thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system.a

ball chain large

Moving past the ransomware hype to focus on real solutions

Andrew Hay shares powerful insights on the reality of ransomware, where it could lead, and what we need to do about it today

video

Security Sessions: Generational differences in security, privacy attitudes

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Ted Harrington of Independent Security Evaluators about how different generations (mainly millennials and Baby Boomers) view both security and...

01 intro

9 data security tips for cloud migration

For organizations considering cloud migration, here are nine proactive steps that companies can take to ensure a smooth transition and get tighter cloud security.

missing puzzle piece

How to attract a board-level cybersecurity expert

Suzanne Vautrinot’s impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the DoD's U.S. Cyber Command and led the...

video

Mingis on Tech: Windows 10 turns 1 -- now what?

It's been a year since Windows 10 rolled out. Executive News Editor Ken Mingis talks with Windows expert Preston Gralla about Microsoft's OS and what's new in the Anniversary Update.

Load More