Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

ashley madison app
dark stairs

Tesla Model S

Ex-Tesla engineer could face prison for hacking former manager's email, FBI says

A former Tesla engineer could face five years in prison for allegedly accessing his former manager's email and pilfering employee evaluations that he shared with other workers.

Tower at

DOJ tightens policies on use of simulated cells for surveillance

The U.S. Department of Justice has issued new guidelines on the use of a cellular surveillance technology called stingrays.

mac app store

FTC finds privacy disclosures improved in kid's apps

Mobile applications aimed at children are doing a better job in recent years of disclosing their privacy practices, but many apps still lack basic information, according to a U.S. Federal Trade Commission survey.

uber ride map 9 3 15blurred

Uber ride data publicly accessible through Google

On Thursday, a site-specific search on Google for trip.uber.com produced dozens of links to Uber rides that have been completed and cancelled, in countries around the world including the U.S., England, Russia, France and Mexico.

video

What's broken in the security industry?

At the recent Black Hat Conference, CSO asked security industry officials about what parts of the industry are broken or needs fixing. See what they had to say in this video.

video

How to Speak Security

At the recent Black Hat Conference, CSO chats with security industry officials about how InfoSecurity leaders can interact with other parts of the business when it comes to data security issues.

video

How is the CISO role evolving?

At the recent Black Hat Conference, CSO chats with security industry officials about how the CISO role has been changing, and whether the role reports to the CIO or Risk Management group.

video

Security Priorities and Challenges

At the recent Black Hat Conference, CSO asked security officials what is "top of mind" in terms of priorities and challenges in the information security industry.

video

What traits do security employers look for?

At the recent Black Hat Conference, CSO asked security officials what traits and skills they look for in employees they want to hire.

video

What Security Terms are Overhyped?

At the recent Black Hat Conference, CSO asked security industry officials what terms or phrases they feel are overhyped or misused.

james mobley

Cisco security chief: 4 things CISOs need to survive

Cisco’s security consulting chief James Mobley outlines four areas CISOs need to develop their skills in order to keep up with the rapidly changing needs of corporate security.

Big Data (3)

Intel promises $50M for quantum computing research

Fully functional quantum computers are still a dozen years off, which is why Intel needs to invest in fundamental research now, according to CEO Brian Krzanich.

Victim of identity theft

Shopperz adware takes local DNS hijacking to the next level

The Shopperz adware program uses a cunning technique to make DNS (Domain Name System) hijacking harder to detect and fix.

hacker backlit keyboard

The myth of the cybersecurity skills shortage

There seems to be a shortage of cybersecurity talent only because people are looking in the wrong places.

black hat 2015

Black Hat survey reveals a disconnect between losses and security program focus

The recently published Black Hat Attendee Survey primarily focused on the concerns of practitioners, including how they actually spent their times and the losses that they incurred. For now though, the most notable statistic is the...

NSA headquarters

ACLU urges court to block NSA's continued phone records collection

The American Civil Liberties Union is taking the NSA back to court over its data collection practices.

Web attack silently modifies DNS configurations in routers

Despite reports of hacking, baby monitors remain woefully insecure

A security analysis of nine baby monitors from different manufacturers revealed serious vulnerabilities and design flaws that could allow hackers to hijack their video feeds or take full control of the devices.

black hat 2015 arrival

Of Black Hat and security awareness

The annual security conference was a chance to go deep. But back in the office, how do you get 100% of the company’s employees to complete the security awareness training?

Load More