Security

Security | News, how-tos, features, reviews, and videos

CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable
g suite app logos

mac vpn hero hub
Updated

Best VPN services: Reviews and buying advice for Mac users

What's the best VPN for Mac? The number of VPN services can be daunting, which is why we've put them to the test—to help you find the best one for Mac owners

surfsharklogo

Surfshark review: A solid VPN newcomer with some nice features

Surfshark only started life in 2018, but it's already showing promise with good speeds, nice features, and a no-logs policy.

windows sandbox splash

Windows Sandbox: How to use Microsoft's simple virtual Windows PC to secure your digital life

Microsoft's Windows Sandbox creates a safe space where you can try suspicious software or sites without risking your 'real' PC. Here's how to use it.

passwords exposed authentication hacked vulnerable security breach

IT services giant HCL left employee passwords, other sensitive data exposed online

HCL left employee passwords, customer project details, and other sensitive information exposed online with no authentication.

drafting military for cyber security cybersecurity govenment

Will the U.S. government draft cybersecurity professionals?

A Congressional commission might soon recommend conscription of cybersecurity professionals to serve in both the military and civil service. Will the government force security pros to work for Uncle Sam?

cyberghost mac icon

CyberGhost 7 review: A great choice for streaming overseas

CyberGhost has great speeds, and some nice extra features, but its support for numerous streaming services is what really sets this service apart.

CSO  >  danger / security threat / malware / binary skull overlaying binary code

What is malware? How to prevent, detect and recover from it

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.

laptop displaying binary code with bandages on its screen

Microsoft sets post-retirement patching record with Windows XP fix – 5 years after support ended

The update – aimed at stopping the spread of WannaCry-like malware on PCs running the outdated OS – must be manually downloaded from the Microsoft Update Catalog.

google titan security key

Google offers free 2FA Bluetooth Titan Security Key swaps after security flaw discovered

Google is offering free replacements for its Bluetooth Titan Security Key due to a security issue.

iot security tablet conference digital

Extreme addresses networked-IoT security

ExtremeAI security app features machine learning technology that can understand typical behavior of IoT devices and automatically trigger alerts when endpoints act in unusual or unexpected ways

Broken window with band-aid patch

Microsoft urges Windows customers to patch wormable RDP flaw

A newly found vulnerability allows remote exploits using the Remote Desktop Protocol to gain full access to systems with no authentication.

sale 18983 primary image

Save $265 on a three-year subscription to GlassWire Elite

Firewall software prevents malware and other threats from invading your PC.

Turn Hyper Threading Off

Intel: You don't need to disable Hyper-Threading to protect against the ZombieLoad CPU exploit

You really don't have to turn off Hyper-Threading to prevent the latest speculative exploit, Zombieland, on Intel CPUs, but some vendors are doing it for you.

Windows security and protection [Windows logo/locks]

Microsoft issues a rare Windows XP patch to combat a virulent WannaCry-like exploit in older OS versions

Windows 7 and various Windows Server operating systems also require a critical security update to combat this Remote Desktop Services exploit.

Intel CPU  >  security

The second Meltdown: New Intel CPU attacks leak secrets

Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work.

best home security cameras
Updated

Best home security camera: Keep an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

Networking cables viewed through a magnifying lens reveal a data breach.

200 million-record breach: Why collecting too much data raises risk

Avoid the siren song of big data and collect only what you need. This is the big takeaway from a 200-million record direct marketing list, including home address, telephone, religious affiliation and financial information now...

sale 19156 primary image

Keep your whole team's passwords secure with RoboForm Everywhere

Five year subscription manages your passwords, auto completes forms, and costs just $60

Load More