Security

Security | News, how-tos, features, reviews, and videos

hacker / cryptocurrency attack
California Consumer Privacy Act  / CCPA  >  State flag / secured data

securitycamera hub image 2019
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

antivirus hub
Updated

Best antivirus: Keep your Windows PC safe from spyware, Trojans, malware, and more

Your PC needs virus protection, full stop. No matter how careful you are, some threats can't be avoided without the aid of antivirus software. Our top picks will keep you protected.

ransomware attack

Ransomware explained: How it works and how to remove it

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

Whitelisting explained: How it works and where it fits in a security program

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it...

trend micro logo crop

Trend Micro Maximum Security review: A great security suite, but privacy features need an overhaul

Trend Micro Maximum Security is a solid antivirus suite with a few privacy features that need an upgrade.

iot security

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

HTTP prefix sympolizing a web address / URL/ domain being manipulated by a hacker.

Chrome to target abusive notification requests beginning in July

Starting with Chrome 84 – scheduled to release July 14 – sites that Google thinks traffic in notifications meant to trick users will be blacklisted.

EU / European Union / GDPR data privacy protection, regulation, compliance

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Wireless telecommunications tower emanating concentric waves of transmission.

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

A report claims that oversight of Chinese telecoms for security threats to the US communications supply chain is lacking and without adequate authority.

A hacker targets a sitting duck  >  easy target / easy pickings / victim targeting

Enterprise internet attack surface is growing, report shows

Attackers are taking advantage of the COVID-19 crisis to exploit pre-existing and newly introduced vulnerabilities across a wide range of attack points.

Microsoft Windows 7 security patches/updates

Local attackers can use Group Policy flaw to take over enterprise Windows systems

Microsoft issues a patch to fix a flaw that could allow compromised non-privileged user accounts to place malicious DLLs on a system.

mac vpn hero hub
Updated

Best VPN services: Reviews and buying advice for Mac users

What's the best VPN for Mac? The number of VPN services can be daunting, which is why we've put them to the test—to help you find the best one for Mac owners

azirevpnlogo

AzireVPN review: A small service with solid performance

AzireVPN is a very basic service with a focus on privacy at the right price.

Antivirus / virus alert / warning / security threats / protection from attack

Protect your PC with McAfee AntiVirus for a ludicrously low $10

Amazon is selling McAfee AntiVirus for $30 off the list price.

HTTP prefix sympolizing a web address / URL/ domain being manipulated by a hacker.

Why abandoned domain names are so dangerous

Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

Cisco issues fixes for numerous iOS XE, industrial router vulnerabilities

Cisco issued 23 Security Advisories that describe 25 exposures in its IOS and IOS XE systems

Load More