Cisco: 13 IOS, IOS XE security flaws you should patch now
Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.
By Michael Cooney | 27 Sep | Read more
Cisco this week warned its IOS and IOS XE customers of 13 vulnerabilities in the operating system software they should patch as soon as possible.
By Michael Cooney | 27 Sep | Read more
Microsoft's Windows Security (formerly Windows Defender) is now on a par with paid solutions such as McAfee and Norton, meaning you could protect your PC for the price of free.
Mark Hachman | 24 Sep | Read more
The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere.
Lucian Constantin | 14 Sep | Read more
NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks.
Lucian Constantin | 11 Sep | Read more
Recent regional ransomware attacks underscore the importance of information sharing among municipalities.
Cynthia Brumfield | 28 Aug | Read more
Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project.
J.M. Porup | 27 Aug | Read more
With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.
Michael P. Magrath | 20 Aug | Read more
As the desire to increase voter turnout remains strong and the number of online voting pilot projects rises in the U.S. and abroad, some security experts warn any internet-based election system is wide open to attack, regardless of the underlying infrastructure.
Lucas Mearian | 12 Aug | Read more
According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.
J.M. Porup | 08 Aug | Read more
A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer.
Josh Fruhlinger | 06 Aug | Read more
Hacker summer camp in Vegas is almost upon us again. Here are some of the best talks of all time. Will this year's talks measure up to these legends?
J.M. Porup and Lucian Constantin | 25 Jul | Read more
Security professionals are in high demand and with the right certification, you’re in even higher demand. To help you decide which certs are for you, we’ve compiled a list of top security certifications -- broken down by entry-level, intermediate and advanced.
Neal Weinberg | 23 Jul | Read more
The U.S. is moving at glacial speed to secure election systems against possible interference by foreign adversaries. We're not even close to ready, and that could call contests into question.
J.M. Porup | 22 Jul | Read more
According to new research, more companies are enabling biometric authentication on devices to verify access requests.
Lucian Constantin | 17 Jul | Read more
A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
Josh Fruhlinger | 16 Jul | Read more
After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.
J.M. Porup | 10 Jul | Read more
You don’t need to be told that cybersecurity is still top of mind for most organisations right now. While specific types of attacks are on the decrease, there’s no shortage of horror stories about companies suffering data breaches, and the impact on business can be disastrous.
By Charlotte Trueman | 27 Jun | Read more
Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.
David Strom | 27 Jun | Read more
A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.
Josh Fruhlinger | 20 Jun | Read more
Breach Clarity ranks the risk of stolen or exposed personal data. It's a much needed work in progress.
Roger A. Grimes | 20 Jun | Read more