Internet Security

Internet Security | News, how-tos, features, reviews, and videos

lock padlock domain name system dns security data center lock icann
HTTPS prefix in a web browser's search/address field

Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.

locked phone and virtual data [mobile security]

In-app browser security risks, and what to do about them

Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.

internet web browser

DNS data indicates increased malicious domain activity, phishing toolkit reuse

Akamai research discovers phishing toolkit reuse played a key role in increased malicious domain activity in the second quarter of 2022.

The shadow of hand unsettlingly hovers over a keyboard.

Researchers warn of darkverse emerging from the metaverse

Cybercriminals see the metaverse as a way to launch cyberattacks, launder money, and carry out disinformation campaigns.

email iot internet security

Perception Point launches managed security service to help eliminate web browser threats

Prevention-as-a-service vendor says its new managed security service lets users browse the web or access SaaS applications without exposing enterprise data to risk.

Browsers version 100 bug

ConcealBrowse isolates malicious software before it can work its mischief

Agent-based solution screens code to prevent browser-borne attacks on the enterprise.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Internet sanctions against Russia pose risks, challenges for businesses

Sanctions on Russian attack for its attack on Ukraine and its response will change the way the internet is used, forcing companies to make hard decisions.

wordpress

Top tools and best practices for WordPress security

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

internet web browser https / url address bar

Traffic interception and MitM attacks among security risks of Russian TLS certs

Russia's launch of a domestic TLS Certificate Authority to bypass Western sanctions and replace revoked and expired certificates amid the invasion of Ukraine poses significant security threats.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Look for attack surface management to go mainstream in 2022

Many organizations struggle to discover, classify, and manage Internet-facing assets, leaving them vulnerable to attack. In 2022, they will finally do something to address this.

ipsecurity protocols network security vpn3

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs.

cso security global breach networking hack invasion infiltrate 5g connected gettyimages 1211443622

Which countries are most (and least) at risk for cybercrime?

Cybersecurity firm SEON has come up with a snapshot of how the threat of cybercrime differs around the world, ranking countries that are most and least vulnerable.

domain name system dns security data center lock icann

Government-wide DNS security strengthens Australia’s cyberdefence

AUPDNS helped protect this year’s online Census by blocking requests for known malicious servers.

binary cyberattack cybersecurity hacked protected

SSRF attacks explained and how to defend against them

Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. Defending against them can be relatively easy.

browser security

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.

Praying mantis among green leaves [camouflage/stealth]

APT group hits IIS web servers with deserialization flaws and memory-resident malware

Praying Mantis group is likely a nation-state actor that uses custom malware and is adept at avoiding detection.

Load More
You Might Also Like