Information Security

Data security news, trends, analysis and practical advice

backlit keyboard

How to handle security vulnerability reports

There are people out there willing to help with your company’s security issues. Isn’t it time your company had its own ‘see something, say something’ policy?

security code big data cyberespionage byte

After MongoDB attack, ransomware groups hit exposed Elasticsearch clusters

After deleting data from thousands of publicly accessible MongoDB databases, ransomware groups have started doing the same with Elasticsearch clusters that are accessible from the Internet and are not properly secured.

code hacker cyberespionage eye data

Disk-wiping malware Shamoon targets virtual desktop infrastructure

A cyber sabotage program that wiped data from 30,000 computers at Saudi Arabia's national oil company in 2012 has returned and is able to target server-hosted virtual desktops.

nup 173075 0006

Trump offers cybersecurity warning: 'No computer is safe'

President-elect Donald Trump weighed in on IT security at a New Year's Eve party, suggesting that the best way to keep secrets from hackers is a huge air gap.

seagate 4tb drive

27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

coopers tools

Free tools for your cyber-security efforts

There are enough quality gratis cyber security tools among the differing security product categories to make this free tool treasure hunt worth your while.

20160225 stock mwc ericsson booth security locks

Ransomware-fighting coalition adds members and decryption tools

The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.

23589815634 22ba532414 o

5 things you should do following the Yahoo breach

Following a massive data breach that affected over one billion Yahoo accounts, users should review the settings of their accounts, clean their mailboxes and turn on additional account security features.

01 holiday phishing

10 top holiday phishing scams

It always happens this time of year, an influx of holiday-related scams circulating the interwebs. Scams don't wait for the holidays, but scammers do take advantage of the increased shopping and distraction when things get busy to...

Visa card

Merchant sites open door to Visa fraud

Visa dismisses the issue as a hypothetical attack method — but security researchers tried it and it worked.

cloud security skywriting

The cloud storage security gap -- and how to close it

Cloud storage vendors don't provide a comfortable balance for some IT admins, but third-party options get you part way there

usb stick

40% off Corsair Waterproof Shockproof 256GB USB 3.0 Flash Drive - Deal Alert

This USB 3.0 flash drive is designed to keep your files safe. The anodized, aircraft-grade aluminum housing is waterproof to 200 meters, vibration-resistant, and shock-resistant. USB 3.0 means read speeds up to four times faster than...

screen shot 2016 11 28 at 10.07.10 am

21% off Seagate Expansion 8TB Desktop External Hard Drive USB 3.0

Instantly add space for more files, consolidate all of your files to a single location, or free up space on your computer's internal drive to help improve performance.

0 intro best practices

Best practices to fight corporate security risks

Ajit Sancheti, CEO and co-founder of Preempt, examines best practices each organization and their users must deploy, both in and out of corporate networks, to minimize malicious threats in inconspicuous (and conspicuous) places.

looking ahead spying

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

deals of week thumbnail

Best Deals of the Week, November 7th - November 11th - Deal Alert

Check out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of November 7th. All items are highly rated, and dramatically discounted.

biokey

Review: BIO-key’s plug-in fingerprint readers for Windows 10 computers

Biometric security means that users don't have to remember those pesky passwords.

irobot roomba

How secure are home robots?

For homeowners (and security professionals) there’s a question about whether home robots could become an attack vector for hackers.

white hat

Protection of white-hat hackers is slow in coming

Laws forbidding hacking into computers are meant to block the theft of intellectual property, music and movie piracy and other criminal activity. But they also have the unintended effect of blocking legitimate cybersecurity research....

huddle football collaboration

Collaborative defense: The shift from ‘what’ to ‘how’

The focus of this year’s Advanced Cyber Security Center conference highlighted the value of using information sharing as a means of helping others to defend against malicious cyber activity.

Load More