Steve Ragan

Senior Staff Writer

Prior to joining the journalism world in 2005, Steve Ragan spent 15 years as a freelance IT contractor focused on infrastructure management and security. He's a father of two and rounded geek with a strong technical background.

Security basics for the holiday season, and the year ahead

Hacking an election is about influence and disruption, not voting machines

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking comes to the surface. During a presidential election, that conversation gets louder. But can you really hack an election? Maybe, but that depends on your goals.

Q&A: The myths and realities of hacking an election

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election with a number of security...

After Paris, ISIS moves propaganda machine to Darknet

After Paris, ISIS moves propaganda machine to Darknet

Less than a day after the horrific attacks in Paris, ISIS has taken the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks.

Three indicted in JPMorgan hacking case

Three indicted in JPMorgan hacking case

On Tuesday, Manhattan US Attorney Preet Bharara's office unsealed an indictment against three individuals charged with hacking several financial institutions, financial news publishers, and other companies.

Key things to consider before you switch to Windows 10

Key things to consider before you switch to Windows 10

Microsoft has started pushing Windows 10 updates, as the newest operating system officially launched last month. However, the latest and greatest might not be the best fit for some organizations, and there are some things that need to...

Organizations should focus data sharing post-incident, not attribution

Organizations should focus data sharing post-incident, not attribution

There have been several notable security incidents in the news this year, from healthcare and retail breaches, to financial; even security firms themselves have been targeted. In each instance, attribution seems to take the lead...

Newest RIG exploit kit driven by malicious ads

Newest RIG exploit kit driven by malicious ads

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

UCLA detects intrusion, but doubts data was actually accessed

UCLA detects intrusion, but doubts data was actually accessed

In a statement on Friday, UCLA Health said that attackers accessed parts of its network where personal and medical records are stored. However, unlike previous medical breaches this year, they have no actual evidence that the attacker...

FBI alert details malware tied to the OPM and Anthem attacks

FBI alert details malware tied to the OPM and Anthem attacks

The FBI has released information about the malware used in the breach at the Office of Personnel Management. It turns out that the malware also has ties to the earlier Anthem hack.

U.S. CENTCOM Twitter feed compromised by 'Cyber Jihadists'

U.S. CENTCOM Twitter feed compromised by 'Cyber Jihadists'

The official Twitter account for the U.S. Central Command (CENTCOM) was compromised Monday afternoon, by attackers claiming to support the terrorist group ISIS.

Staples confirms data breach investigation

Staples confirms data breach investigation

Investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the Northeastern U.S.

Load More