Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.
Josh Fruhlinger |
09 Aug |
Read more
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.
Josh Fruhlinger |
03 Jul |
Read more
Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.
Josh Fruhlinger |
02 Jul |
Read more
Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.
Josh Fruhlinger |
25 May |
Read more
Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.
Josh Fruhlinger |
11 May |
Read more
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
Josh Fruhlinger |
09 May |
Read more
The process for getting the FedRAMP seal of approval is complex, but it can ultimately be lucrative for companies that meet the security requirements.
Josh Fruhlinger |
02 Apr |
Read more
Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.
Josh Fruhlinger |
09 Mar |
Read more
Spectre and Meltdown are the names given to a trio of variations on a vulnerability that affects nearly every computer chip manufactured in the last 20 years. The flaws are so fundamental and widespread that security researchers are calling them catastrophic.
Josh Fruhlinger |
15 Jan |
Read more
The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.
Josh Fruhlinger |
10 Jan |
Read more
From virtual bank heists to semi-open attacks from nation-states, this year has been rough on IT security. Here are some of the major cyber attacks of 2017 and what we can learn from them.
Josh Fruhlinger |
15 Nov |
Read more
Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not always truthfully — to restore access to the data upon payment.
Josh Fruhlinger |
13 Nov |
Read more
The scams are so widespread that they've affected how the IRS works, delaying legitimate refunds to many taxpayers. Here's what you need to know about the different types of IRS scams and how to avoid them.
Josh Fruhlinger |
24 Oct |
Read more
NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.
Josh Fruhlinger |
17 Oct |
Read more
The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.
Josh Fruhlinger |
12 Oct |
Read more