Communications Security

Communications Security | News, how-tos, features, reviews, and videos

Tour de France cyclists racing / global digital broadcast connections
mobile security / threat detection / traffic analysis

incoming emails / DNS security / locked server / parked domain

How to stop email spoofing of parked domains

Publishing a DMARC record for unused domains is a good idea. Here's how.

secured vpn tunnel

What is WireGuard? Secure, simple VPN still in development

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

VPN security vulnerabilities  >  VPN alert / warning / network servers

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions.

5G mobile wireless network technology

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out.

Email encryption  >  A key + a three-dimensional 'at' symbol bearing a series of locks.

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP).

SMS phishing / smishing  >  Mobile phone displays text bubble with skull + crossbones

SMS-based provisioning messages enable advanced phishing on Android phones

Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy.

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.

many office desk phones

Popular Avaya enterprise VoIP phones are vulnerable to hacking

Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Telecom insiders detail hardships posed by Chinese technology ban

Banning Chinese Telecom vendors Huawei and ZTE creates fear, uncertainty and doubt as well as new supply chain security ideas among small telcos.

CSO slideshow - Insider Security Breaches - Flag of China, binary code

Why the Huawei ban is bad for security

Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats.

email security lock breach protocol by microstockhub getty

Preventing address spoofing with DMARC, DKIM and SPF

These email security protocols will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think.

Android Notifications

Moving beyond template-based notifications

How to identify your gray area stakeholders for more effective incident response communications.

Slack logo/wordmark [2019]

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces.

#slack signage

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

digital network privacy - eavesdropping

Are mixnets the answer to anonymous communications?

Combined with strong encryption such as the Signal protocol, modern mixnets could achieve the Holy Grail: metadata-resistant secure communications.

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.

Load More