Internet Security

Internet Security | News, how-tos, features, reviews, and videos

searching, search bar
library books, shelves / repository

Security threat [illustration]  >  A hacker with black hat, mask, and crowbar breaks into a laptop.

Critical flaw in WooCommerce can be used to compromise WordPress websites

The vulnerability could allow unauthenticated administrative takeover of websites. WooCommerce has released an update.

businessman data risk metering management security

How to de-risk your digital ecosystem

Digital ecosystems are big, complicated, and a massive vector for exploits and attackers. Santha Subramoni, global head, cybersecurity business unit at Tata Consultancy Services discusses digital ecosystems security and how businesses...

virtual certificate icon / certification

DigiCert releases Trust Lifecycle Manager to unify certificate management, PKI services

Digital security certificate firm says product sets a new standard for managing digital trust and reduces an organization’s attack surface to help prevent data breaches.

lock padlock domain name system dns security data center lock icann

Global 2000 companies failing to adopt key domain security measures

Lookalike domains are targeting Forbes Global 2000 brands to launch phishing attacks and other forms of digital brand abuse/IP infringement.

HTTPS prefix in a web browser's search/address field

Secure web browsers for the enterprise compared: How to pick the right one

These enterprise-grade, Chromium-based web browsers are designed for the security needs of the enterprise, not the consumer.

Tech Spotlight   >   Analytics [CSO]   >   An image of a bottle of poison emanating binary code.

SEO poisoning campaign directs search engine visitors from multiple industries to JavaScript malware

The sophisticated campaign sends victims looking for business forms and templates to sites containing malicious files.

locked phone and virtual data [mobile security]

In-app browser security risks, and what to do about them

Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them.

internet web browser

DNS data indicates increased malicious domain activity, phishing toolkit reuse

Akamai research discovers phishing toolkit reuse played a key role in increased malicious domain activity in the second quarter of 2022.

The shadow of hand unsettlingly hovers over a keyboard.

Researchers warn of darkverse emerging from the metaverse

Cybercriminals see the metaverse as a way to launch cyberattacks, launder money, and carry out disinformation campaigns.

email iot internet security

Perception Point launches managed security service to help eliminate web browser threats

Prevention-as-a-service vendor says its new managed security service lets users browse the web or access SaaS applications without exposing enterprise data to risk.

Browsers version 100 bug

ConcealBrowse isolates malicious software before it can work its mischief

Agent-based solution screens code to prevent browser-borne attacks on the enterprise.

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Internet sanctions against Russia pose risks, challenges for businesses

Sanctions on Russian attack for its attack on Ukraine and its response will change the way the internet is used, forcing companies to make hard decisions.

wordpress

Top tools and best practices for WordPress security

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

internet web browser https / url address bar

Traffic interception and MitM attacks among security risks of Russian TLS certs

Russia's launch of a domestic TLS Certificate Authority to bypass Western sanctions and replace revoked and expired certificates amid the invasion of Ukraine poses significant security threats.

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Look for attack surface management to go mainstream in 2022

Many organizations struggle to discover, classify, and manage Internet-facing assets, leaving them vulnerable to attack. In 2022, they will finally do something to address this.

ipsecurity protocols network security vpn3

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs.

Load More
You Might Also Like