Internet Security

Internet Security | News, how-tos, features, reviews, and videos

06 permission
Slack logo/wordmark [2019]

secure encrypted internet web browser alert

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards.

wordpress

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

new job roles

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role.

firewall network security lock padlock cyber security

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs.

certificate

Google makes good on promise to remove some Symantec PKI certificates

If you get this digital certificate error using Chrome, then Google now considers that website's Symantec PKI certificate untrustworthy.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

broken web app hacker

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management.

abstract data statistics

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what's happening in the cybersecurity world? We dug into studies and surveys of the industry's landscape to get a sense of the lay of the land—both in terms of what's happening and how...

north korea statue pyongyang

FBI, DHS warn of North Korean RAT and worm malware

The U.S. government released an alert about two strains of North Korean malware that are being used by Hidden Cobra.

thinkstockphotos canada flag

2 Canadian banks hacked, 90,000 customers' data stolen

Bank of Montreal and the Canadian Imperial Bank of Commerce’s Simplii Financial confirmed hackers stole the personal and financial data of thousands of customers.

forensics threat hunter cyber security thumbprint

Cato Networks adds threat hunting to its SD-WAN services

Cato Threat Hunting System includes algorithms and procedures to alert on threats -- without adding endpoint or network monitoring tools to the customer network.

binary cyberattack cybersecurity hacked protected

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

net neutrality computer internet broadband regulation goverment

Senators urge FCC to investigate ID theft in fake net neutrality comments

In bipartisan letter, senators tell FCC that 'We the People' deserve to know who misused Americans’ identities and submitted the millions of fake net neutrality comments.

RSA conference 2017

RSA roundup: 5 security vendors CISOs need to be aware of

Here are five companies that security professionals should consider in their quest to keep their organizations secure.

russian military

Russia is hacking routers in global cyber attacks, US and UK warn

In a first-of-its-kind advisory, the U.S. and U.K. warned of malicious cyber activity by state-sponsored Russian hackers who are targeting network infrastructure devices.

panera bread

Panera Bread blew off breach report for 8 months, leaked millions of customer records

As many as 37 million customer records were exposed thanks to a security vulnerability that Panera Bread chose to ignore for eight months.

plastic soldiers

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security.

ermergency reponse siren

Baltimore's 911 dispatch hacked, CAD system down for 17 hours

Baltimore’s 911 dispatch system was hacked over the weekend, causing the Computer Aided Dispatch (CAD) system to be down for over 17 hours.

Load More
You Might Also Like