Lucian Constantin

CSO Senior Writer

Lucian Constantin writes about information security, privacy, and data protection for CSO.

Use of cloud collaboration tools surges and so do attacks

Your best defense against insider threats | TECH(talk)

Your best defense against insider threats | TECH(talk)

When employees are your weakest link, companies must have programs in place to prevent them from accidentally or intentionally putting the organization at risk. Watch as TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss various...

5 vragen en antwoorden over adware

Hoe schadelijk is het, hoe voorkom je adware en meer vragen beantwoord.

4 brandende vragen over Intels nieuwe chipgat

Meer dan een Meltdown-variant; MDS is een nieuw klasse kwetsbaarheid.

Wachtwoordmanager blijft belangrijke tool ondanks lekverhalen

Als je een apparaat helemaal is veroverd, is RAM-scraping de minste van je zorgen.

Shadow Brokers teases more Windows exploits and cyberespionage data

Shadow Brokers teases more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.

Shadow Brokers boasts of more Windows exploits and cyberespionage data

Shadow Brokers boasts of more Windows exploits and cyberespionage data

A group of hackers that previously leaked alleged NSA exploits claims to have even more attack tools, as well as intelligence gathered by the agency on foreign banks and ballistic missile programs.

WannaCry attacks are only the beginning

WannaCry attacks are only the beginning

As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future.

WannaCry ransomware attacks won't be the last

WannaCry ransomware attacks won't be the last

As the WannaCry ransomware attack evolves, more cybercriminals are likely to attempt to profit from the vulnerability it exploits and similar flaws in the future.

Google will review web apps that want access to its users' data

Google will review web apps that want access to its users' data

In response to recent attacks where hackers abused Google's OAuth services to gain access to Gmail accounts, the company will review new web applications that request Google users' data.

New ransomware Jaff demands $3,700 payments

New ransomware Jaff demands $3,700 payments

Attackers behind the highly successful Locky and Bart ransomware campaigns have returned with a new creation: A malicious file-encrypting program called Jaff that asks victims for payments of around $3,700

Latest firmware updates for Asus routers fix CSRF security flaws

Latest firmware updates for Asus routers fix CSRF security flaws

Users of Asus RT-N and RT-AC series routers should install the latest firmware updates released for their models because they address vulnerabilities that could allow attackers to hijack router settings.

Load More