software

software - News, Features, and Slideshows

Most popular

software in pictures

News about software
Tutorials about software
Features about software
  • Three security practices that IoT will disrupt

    By Jonathan Lampe | 28 August, 2014 05:05

    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by now.

  • Kicking the stool out from under the cybercrime economy

    By Grant Hatchimonji | 20 August, 2014 02:54

    Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

  • The making of a cybercrime market

    By Sean Martin | 12 August, 2014 06:23

    I recently had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT--Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.

  • Why your online identity can never really be erased

    By Taylor Armerding | 05 August, 2014 05:37

    One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.

  • Security must evolve to be 'all about the data'

    By Taylor Armerding | 25 July, 2014 10:35

    There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.

Whitepapers about software

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Custom Defence against targeted attacks

Deep Discovery is uniquely designed for threat detection, real-time intelligence, adaptive protection, and rapid response to combat targeted attacks and Advanced Persistent Threats (APTs).

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.