News

forensics threat hunter cyber security thumbprint
jobs collaboration careers network

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

Quantum Break

Chinese citizen tries to steal advanced robotic technology IP

Medrobotics' CEO caught Dong Liu in the company's conference room attempting to steal advanced robotic intellectual property.

binary cyberattack cybersecurity hacked protected

End-to-end security requires multi-vendor automation

To make it easier to use security tools from multiple vendors, as well as bake security into the development process, Fortinet introduces Fabric Connectors and DevOps integration.

fbi badge gun

FBI 'Going Dark' whopper: Locked out of only 1,200 phones, not 7,775

The FBI blames programming errors for grossly inflating the number of encrypted, unhackable phones it said it needed backdoors into.

net neutrality computer internet broadband regulation goverment

Senators urge FCC to investigate ID theft in fake net neutrality comments

In bipartisan letter, senators tell FCC that 'We the People' deserve to know who misused Americans’ identities and submitted the millions of fake net neutrality comments.

honey jar

Salted Hash Ep 26: Deception technologies that camouflage the network

Sometimes, the best defense is awareness. At their core, deception technologies can assist in this process, but what's the difference between a deception vendor and a honey pot?

template c100.00 01 18 00.still001
video

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.

serious teenagers on smartphones 159021305

Thousands of kids’ Apple IDs stored in plaintext on unprotected server

Researcher discovered TeenSafe stored thousands of kids’ Apple IDs in plaintext on an unprotected AWS server. The server has since been taken down.

Anonymized identity

The Pentagon has a project that aims to verify identity via smartphone

A Pentagon-funded project that aims to add tech to verify identity and ultimately to assign a “risk score” to you could be included in new smartphones within two years.

tech talk opening.00 14 30 21.still001
video

Tech Talk: Prepping for GDPR

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.

mute google home amazon echo

Voice squatting attacks: Hacks turn Amazon Alexa, Google Home into secret eavesdroppers

Researchers devise new two new attacks -- voice squatting and voice masquerading -- on Amazon Alexa and Google Home, allowing adversaries to steal personal information or silently eavesdrop.

cybersecurity

White House axes cyber czar role; DHS unveils new cybersecurity strategy

The White House eliminated the top cybersecurity coordinator position even as Homeland Security warned that "our cyber adversaries can now threaten the very fabric of our republic itself."

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

scanning the internet malicious magnifying glass

GreyNoise: Knowing the difference between benign and malicious internet scans

Used with Shodan, this "search engine that looks at people scanning the internet" can help you pick bad actors out of the noise.

facial recognition - biometric security identification - binary face

Facial recognition tech used by UK cops is 'dangerously inaccurate'

Overall, the facial recognition technology used by UK cops has resulted in inaccurate matches 95 percent of the time.

template c100.00 09 18 18.still001
video

Get a hands-on, inside look at the dark web | Salted Hash Ep 25

Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.

dark web hacker tablet malware

Salted Hash Ep 25: A quick tour of the Dark Web

The Dark Web has an interesting persona, and much of it is fueled by hype. This week on Salted Hash we speak to Alon Arvatz, co-founder at IntSights, who gives us a basic overview of some of the things people do in this somewhat...

Load More