software

software - News, Features, and Slideshows

Most popular

software in pictures

News about software
  • Five ways to keep your student's digital life safe

    By Christopher Breen | 20 August, 2014 23:24

    As students return to school, technology goes with them. That technology--and the data generated by it--is valuable not simply as a means for getting school work done, but also as entertainment for those brief hours between one assignment and the next. It's for this reason that it pays to plan for disaster. With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.

  • Heartbleed to blame for Community Health Systems breach

    By Steve Ragan | 20 August, 2014 11:02

    According to a blog post from TrustedSec, an information security consultancy in Ohio, the breach at Community Health Systems (CHS) is the result of attackers targeting a flaw OpenSSL, CVE-2014-0160, better known as Heartbleed.

  • Many Chrome browser extensions do sneaky things

    By Jeremy Kirk | 20 August, 2014 11:01

    An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.

  • 5 cool new security research breakthroughs

    By Bob Brown | 20 August, 2014 08:46

    University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.

  • Why it is time to intensify employee education on phishing

    By Antone Gonsalves | 19 August, 2014 22:40

    Companies should consider intensifying employee training to combat the increasing craftiness of phishers who are working harder to obtain personal details on targets in order to trap them in scams.

Tutorials about software
Features about software
  • Kicking the stool out from under the cybercrime economy

    By Grant Hatchimonji | 20 August, 2014 02:54

    Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

  • The making of a cybercrime market

    By Sean Martin | 12 August, 2014 06:23

    I recently had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT--Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.

  • Why your online identity can never really be erased

    By Taylor Armerding | 05 August, 2014 05:37

    One seemingly unshakeable truth about the online world since it began is this: The Internet never forgets. Once you post anything online, it is recoverable forever -- the claims of former IRS official Lois Lerner about "lost" emails notwithstanding. Even promises of photos disappearing after a few seconds have been shown to be bogus.

  • Security must evolve to be 'all about the data'

    By Taylor Armerding | 25 July, 2014 10:35

    There is a fierce debate about whether GMOs - genetically modified organisms - with built-in resistance to pests, fungus, drought and other agricultural threats, are a good thing when it comes to our food supply.

  • Three strategies for the new era of enterprise cybersecurity

    By John N. Stewart | 18 June, 2014 06:11

    The pace of change for Information Technology is challenging established notions of "What is IT?" and "What is Information Security in the modern age?" For one example, the "new" data center technologies such as virtualization, Software-Defined Networking (SDN), service-oriented delivery models, and cloud computing have radically changed the typical IT infrastructure from a defined set of assets owned and controlled by the organization to a constantly fluctuating roster of resources that can come and go from IT department visibility and control.

Whitepapers about software

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Virtualisation Security

Deep Security provides a comprehensive Server Security Platform giving organisations advanced protection for Physical, Virtual, and Cloud Servers.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.