Security

Security | News, how-tos, features, reviews, and videos

gears orange large efficient automated machine learning automation
purevpnlogo

deepfakes fake news unreal doctored malicious personal attack video audio

How blockchain could help block fake news

Creating an immutable ledger to track metadata associated with published content shows promise as a method for identifying authentic news.

Microsoft Windows 7 security patches/updates

Microsoft springs last-minute demand on buyers of Windows 7 after-expiration support

IT admins who signed up for Windows 7 post-retirement support found out there's a new prerequisite that has to be installed before they can download patches they've already paid for.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Computerworld > Mobile voting via phone / digital ballot

MIT researchers say mobile voting app piloted in U.S. is rife with vulnerabilities

The flaws could let a hacker alter, stop or expose how a person has voted.

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

Cloud Computing - Unified Endpoint Management U[EM]

BlackBerry says its new Digital Workplace eliminates need for VPN, VDI

BlackBerry has integrated its Desktop and Access Browser with partner Awingu's secure browser-based workspace and AI-driven security software from its acquisition of Cylance.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

mobile security / threat detection / traffic analysis

Thirteen rules for developing secure Java applications

Make Java security a top priority at every stage of application development, from class-level language features to API endpoint authorization

FinTech abstract / virtual world of dollars, pounds, euros, bitcoins, etc.

Why the Fed is considering a cash-backed cryptocurrency

A real-time payments infrastructure enabled by a blockchain-based stablecoin could offer many advantages, a Federal Reserve governor said during a recent speech.

Internet of think with padlock showing security

Who should lead the push for IoT security?

Industry groups and governmental agencies have been taking a stab at rules to improve the security of the internet of things, but so far there’s nothing comprehensive.

election hacking security 2020 election security flag global breach by stuartmiles99 getty

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing.

icloud 2fa apple id

Getting started with 2FA: Secure your accounts now or regret it later!

Unique passwords are essential, but they’re not enough. You should secure all important accounts with two-factor authentication.

IDG Tech Spotlight  >  Security  >  Balancing security and innovation

Security vs. innovation: IT's trickiest balancing act

An innovative initiative is only as successful as it is secure. Here’s how CIOs are balancing risk-taking with risk aversion.

IDG Tech Spotlight  >  Security  >  UEM/unified endpoint management and security

UEM to marry security — finally — after long courtship

Machine learning will be key in evaluating whether a mobile device and its user should be allowed to connect to a corporate application or data silo, as user behavior becomes a part of overall endpoint security.

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

Load More