Steve Ragan

Senior Staff Writer

Prior to joining the journalism world in 2005, Steve Ragan spent 15 years as a freelance IT contractor focused on infrastructure management and security. He's a father of two and rounded geek with a strong technical background.

Hacking an election is about influence and disruption, not voting machines

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections. In this modified edition of CSO Online's Hacked Opinions series, we explore the myths and realities of hacking an election with a number of security...

After Paris, ISIS moves propaganda machine to Darknet

Less than a day after the horrific attacks in Paris, ISIS has taken the Al-Hayat propaganda machine to the Darknet and published a new video celebrating the Paris attacks.

Three indicted in JPMorgan hacking case

Three indicted in JPMorgan hacking case

On Tuesday, Manhattan US Attorney Preet Bharara's office unsealed an indictment against three individuals charged with hacking several financial institutions, financial news publishers, and other companies.

Comcast resets nearly 200,000 passwords after customer list goes on sale

Comcast resets nearly 200,000 passwords after customer list goes on sale

Over the weekend, a reader directed Salted Hash to a post on a Dark Web marketplace selling a number of questionable, if not outright illegal goods. The post in question offered a list of 590,000 Comcast email addresses and...

Key things to consider before you switch to Windows 10

Key things to consider before you switch to Windows 10

Microsoft has started pushing Windows 10 updates, as the newest operating system officially launched last month. However, the latest and greatest might not be the best fit for some organizations, and there are some things that need to...

Organizations should focus data sharing post-incident, not attribution

Organizations should focus data sharing post-incident, not attribution

There have been several notable security incidents in the news this year, from healthcare and retail breaches, to financial; even security firms themselves have been targeted. In each instance, attribution seems to take the lead...

Newest RIG exploit kit driven by malicious advertising

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

Newest RIG exploit kit driven by malicious ads

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

UCLA detects intrusion, but doubts data was actually accessed

In a statement on Friday, UCLA Health said that attackers accessed parts of its network where personal and medical records are stored. However, unlike previous medical breaches this year, they have no actual evidence that the attacker...

FBI alert details malware tied to the OPM and Anthem attacks

FBI alert details malware tied to the OPM and Anthem attacks

The FBI has released information about the malware used in the breach at the Office of Personnel Management. It turns out that the malware also has ties to the earlier Anthem hack.

Slack boosts security after data breach

Slack boosts security after data breach

Slack, a popular start-up focused on collaboration in the workplace, said on Friday that a database storing user profile information was compromised in February. The incident lasted four days, but the company said that only a small...

Load More