Security

Security | News, how-tos, features, reviews, and videos

many office desk phones

Popular Avaya enterprise VoIP phones are vulnerable to hacking

Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.

teamwork collaboration / leadership / development / developers / abstract data

Black Hat keynote: Why security culture needs to change

Dino Dai Zovi tells Black Hat audience to embrace a culture where security is everyone's job and risks are shared. Automation with feedback loops also key to solving security challenges at scale

Compliance

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected.

binary code matrix

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

compromised data / security breach / vulnerability

New Spectre-like CPU vulnerability bypasses existing defenses

The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Sharks and phishers are circling, looking to snag a bite

Security professionals need to work together to come up with effective threat strategies, better training and intelligence alert systems in effort to keep phishing attacks at a minimum.

CSO > wolf in sheeps clothing / fraud / identity theft / social engineering

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature.

computer infection spreading

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.

black hat / hacker / spotlight / binary overlay

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

mobile connection endpoint protection laptop shield

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious.

California Consumer Privacy Act  / CCPA  >  State flag superimposed on map and satellite view

What is the CCPA and why should you care?

CCPA is the law and the only way for a business to opt-out of it is to go out of business. For businesses that want to stay in business, however, CCPA is just the beginning of things to come.

team of hackers / organized attack / group of threat actors

Time – and the lack thereof

For cybersecurity, it is pivotal for the next decade to be able to operate with a decreasing time window to act.

performance / show / stage

7 must-see talks at Black Hat and DEF CON 2019

Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology.

hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

virtual brain / digital mind / artificial intelligence / machine learning / neural network

What are the security implications of Elon Musk's Neuralink?

Wacky science fiction has come to life with Elon Musk’s latest idea: chips implanted in human heads that talk to smart devices. What could possibly go wrong?

identifying talent / opportunity / double-exposure business people, gears, light, rising escalator

How JustEat finds and trains in-house security talent

Employees in other departments might have skills that play well in security and the desire to make the jump. JustEat CISO Kevin Fielder explains how he introduces those people to cybersecurity and integrates them with the team.

Columns of checkmarks and stars.

Top cyber security certifications: Who they're for, what they cost, and which you need

Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications.

Capital One  >  hack

Is the cloud lulling us into security complacency?

In other words, is reliance on cloud services lulling us into security complacency?

Load More