applications - News, Features, and Slideshows

Most popular

News about applications
  • Router malware: Fact or fiction?

    By Ronald Kaplan, Dylan Kaplan | 29 August, 2014 04:31

    Malware affecting a computer's operation is not always found in the computer itself. Just recently we encountered a common operational issue on several computers in our home network. Various browsers on different computers running different operating systems were intermittently redirecting webpages. The issue manifests itself by redirecting webpages to an unfamiliar merchant site.

  • Spotting Web threats in the confusion of short-lived hostnames

    By Antone Gonsalves | 28 August, 2014 22:51

    Researchers have found that the vast number hostnames constantly changing on the Web for legitimate purposes creates a cover for cybercriminals and weakens the effectiveness of security controls.

  • Toss routers with hardcoded passwords, expert says

    By Antone Gonsalves | 27 August, 2014 23:02

    Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer.

  • 27 million South Koreans affected by data breach

    By Steve Ragan | 25 August, 2014 22:52

    South Korean authorities have revealed details surrounding massive data breach that impacts 27 million people aged 15-65. The compromised data comes from website registrations for various games and online gambling promotions, ringtone storefronts, and movie ticketing.

  • DevOps not a security threat, says AWS panel

    By Stephen Withers | 25 August, 2014 12:22

    During a security round table at the recent Technology in Government event, some delegates emphasised the need for separation of duties between development and operations staff.

Tutorials about applications
Features about applications
  • Three security practices that IoT will disrupt

    By Jonathan Lampe | 28 August, 2014 05:05

    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by now.

  • Kicking the stool out from under the cybercrime economy

    By Grant Hatchimonji | 20 August, 2014 02:54

    Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

  • The making of a cybercrime market

    By Sean Martin | 12 August, 2014 06:23

    I recently had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT--Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.

  • Why your online identity can never really be erased

    By Taylor Armerding | 05 August, 2014 05:37

    One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.

  • Security must evolve to be 'all about the data'

    By Taylor Armerding | 25 July, 2014 10:35

    There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.

Whitepapers about applications

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Security and Data Protection

Protect your computers and data.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.