Latest articles for CSO magazine

RIG exploit kit takes over while Angler on vacation

The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure…

DDoS attack on BBC may have been biggest in history

Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…

Silent Circle patches Blackphone vulnerability

A report released this morning shows that no phone is 100 percent secure — but that one company, at least, is able to respond quickly…

Global geopolitical risk predictions for 2016

The previous 25 years have been marked by globalization. A number of forces acted together to bring our planet closer together. Trade pacts, peacekeeping alliances,…

PhishMe report shows employees can become assets in anti-phishing battle

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

PhishMe report shows employees can become assets in anti-phishing battle

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

Lost devices account for bulk of healthcare security incidents

Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon’s new health care data breach report, accounting for…

Firms expect fines, new costs from Safe Harbor changes

IT budgets are expected to see a rumble of activity in the wake of the Safe Harbor earthquake.In a new Ovum survey of IT decision…

Darkode forum is back, but a shadow of its former self

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

Darkode forum is back, but a shadow of its former self

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

US cyber criminal underground a shopping free-for-all

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…

US cyber criminal underground a shopping free-for-all

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…

Report: Scripting languages most vulnerable, mobile apps need better crypto

According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…

Report: Scripting languages most vulnerable, mobile apps need better crypto

According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…

Most hackable devices

Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…

Retailers targeted by sophisticated ModPOS malware

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely…

OpenDNS listens for malicious melodies

Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns…

New ad-fraud botnet targets major corporations, universities

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.The Xindi…

Exploit kit activity up 75 percent in third quarter 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to…

The dark side of layered security

Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these…

iOS apps more vulnerable than Android

Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as…

10 riskiest applications that have passed their expiration dates

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

10 risky software that have passed their expiration dates

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

9 of 10 directors support regulator action on cybersecurity

In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…

East European botnet targets Russian banks

Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception,…

CSOs demanding more from cybersecurity tech

CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and…

Despite recent moves against Adobe, 80% of PCs run expired Flash

Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…

Iranian hackers get tech support on forums

Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.According to research released this morning by…

10 riskiest cloud services

Risky businessImage by Tobias Van Der ElstThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks.To read this article…

Experts urge caution when putting health data in the cloud

Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…