Security

Security news, trends, analysis and practical advice

3147352
Digital Key encryption

windows trouble controversy crash problem hacked

What’s up with Windows patching, Microsoft?

A month late? Seriously? It’s both outrageous and unsurprising.

President Donald Trump and Vice President Mike Pence

Indiana joins Idaho in claiming DHS tried to hack their election systems

Indiana claims DHS scanned the state's electoral system tens of thousands of times without permission.

03 patch

Microsoft pushes out critical Flash Player patches after one-week delay

After deciding to postpone its February patches for a month, Microsoft released one critical security update for Windows on Tuesday that contains Flash Player patches released by Adobe Systems last week.

satya nadella wdg event 2016

LinkedIn will help people in India train for semi-skilled jobs

Microsoft has launched Project Sangam, a cloud service integrated with LinkedIn that will help train and generate employment for middle and low-skilled workers.

Computer monitor with pixelated locks for security breach

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways.

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks.

23922465470 fe3c8b8cdf o

Verizon knocks $350M from Yahoo deal after breaches

Verizon Communications will pay $350 million less for Yahoo after two major data breaches reported by the struggling internet pioneer.

Windows 10 start menu

Changes to Windows 10's data-gathering not enough to satisfy EU privacy watchdogs

European Union privacy watchdogs are still not happy with Windows 10's gathering of data about its users, over a year after they first wrote to Microsoft to complain.

Privacy

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization.

code hacker cyberespionage eye data

Hackers behind bank attack campaign use Russian decoy

The hackers behind a sophisticated attack that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

uber

Uber to investigate female engineer’s ‘abhorrent’ sexual harassment claims

Uber CEO Travis Kalanick has ordered an 'urgent investigation.'

Talking heads
video

RSA demo: TruSTAR anonymizes incident data to improve information exchange

TruSTAR's head of product, Shimon Modi, shows CSO Online's Steve Ragan how his company is changing the game when it comes to incident reporting for companies.

Talking heads
video

Why robotics is key to cybersecurity's future

Chad Holmes, Principal of Ernst & Young LLP sits down with Neal Weinberg to talk about how cyber-robotics will help shape the future of cybersecurity.

RSA

Here’s how the U.S. government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before Congress, warning about the dangers of the internet.

windows10

Why February's Patch Tuesday is delayed

After a short break since our Patch Tuesday debugged analysis in January, it looks like we are going to have some delay with Patch Tuesday in February due to a last minute technical issue with the Microsoft release process.

20160224 stock mwc freeway cars traffic barcelona

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could allow hackers to easily hijack their functionality.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need a plan for negotiating with people who take their data hostage.

Load More