Security

Security | News, how-tos, features, reviews, and videos

broken window with windows logo in clouds
private public hybrid cloud technology sign

7 safe browswer search legitimate url domains surfing the internet

Chrome, Firefox to expunge Extended Validation cert signals

Google and Mozilla have decided to eliminate Extended Validation signals in their desktop browsers; the certificates were designed to assure users they landed on a legitimate site, not a malicious copycat.

The most significant data breaches

The biggest data breaches that have affected people in the UK.

ibm 16 qubit processor

What happens when cyber attackers reach quantum-advantage?

Aerospace and defence group Thales is investing in a large ecosystem of partners to work on quantum-resistant cryptography: without it, legacy cryptography could be broken overnight.

Election security / vulnerabilities

Why blockchain-based voting could threaten democracy

As the desire to increase voter turnout remains strong and the number of online voting pilot projects rises in the U.S. and abroad, some security experts warn any internet-based election system is wide open to attack, regardless of...

black hat / hacker / spotlight / binary overlay

Apple announces a new iPhone (and you can’t have it)

The pre-jailbroken iPhone for security researchers is a hit at Black Hat 2019.

mobile phone - privacy - security

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

ipsecurity protocols network security vpn2

Many VPN apps on Apple’s App store can’t be trusted, researcher warns

Apple must look into the security and privacy of VPN apps provided by its App Stores

it security lock cybersecurity breach alignment

Almost half of tested free Android antivirus apps fail. That might prove very useful to IT.

In BYOD environments, users tend to supplement corporate security programs with free versions. That is a remarkably bad idea, and one analyst report suggests a way to stop it.

p1240491 19

Microsoft relaxes telemetry rule for PCs managed with Windows Update for Business

A rule that kept privacy-first organizations from using group policies to manage the update service will no longer have to set the "diagnostic data level" for devices to Basic or above.

cssg 021 thumb
video

How to set up Edge Chromium security options

Edge Chromium can provide more protection for organizations that use older versions of Windows.

Slack logo/wordmark [2019]

Slack beefs up mobile security controls for Enterprise Grid

The latest updates to security controls for Slack’s enterprise-grade collaboration app are designed to make it easier to manage data on a range of devices.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

It’s time to install most of July's Windows and Office patches

If you’ve been keeping your Windows 7/Server 2008 R2 machines clean with “Security-only” patches, July has an important change to consider. For most people, the coast is clear to install the July 2019 patches.

Most in-demand cyber security jobs in the UK

We reveal the top security jobs for all aspiring IT pros

Scattered business people in personal wireframe spaces within a massive data repository.

Apple suspends Siri snooping (and promises more control for the rest of us)

Apple announces the immediate global suspension of its controversial Siri grading program

tt19 033 thumb
video

Black Hat 2019 and DEF CON 27: What to expect at hacker summer camp | TECH(talk)

Every year, thousands of hackers arrive in Las Vegas for three large security conferences -- DEF CON, Black Hat and Bsides Las Vegas -- taking place from Monday through Sunday next week. CSO Online's J.M. Porup chats with Juliet about...

tf19 046 thumb update2
video

The latest large-scale data breach: Capital One | TECH(feed)

Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the...

The Snoopers' Charter: Everything you need to know about the Investigatory Powers Act

The UK government's Investigatory Powers Bill has sparked debate over the balance between privacy concerns and national security in the post-Snowden era, with controversy around encryption, bulk data and hacking being aimed at the...

cssg 020 thumbpng
video

How an attacker can target phishing attacks

There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you...

Load More