Latest articles for CSO magazine

Battling global DDoS attacks requires coordinated response

Service providers that run the backbone of the internet need to have a coordinated response to deal with a global distributed denial of service attack,…

Report: Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…

Security experts divided on ethics of Facebook’s password purchases

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts…

Visibility, security top concerns for cloud computing adoption

Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…

AI makes security systems more flexible

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…

Flood of threat intelligence overwhelming for many firms

Three years after Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still…

Unencrypted pagers a security risk for hospitals, power plants

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…

Why don’t developers have a ‘spellchecker’ for security’?

Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities.Of course, nobody is perfect. We all make mistakes,…

Russian criminals’ bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…

Flash mobs the latest threat this holiday season

The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…

Cybersecurity ‘ninjas’ value challenges, training and flexible schedules over pay

Challenging work, skills training and flexible work hours are important for all cybersecurity employees, but especially so for the highest skilled workers, according to a…

Researcher unveils second Samsung Pay vulnerability

Samsung just can’t catch a break these days. Its phones are exploding, and so are its washing machines, and now a security researcher has found…

Yahoo shows that breach impacts can go far beyond remediation expenses

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on…

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…

Data leaks evolving into weapons of business destruction

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…

Diversified supply chain helps ‘Vendetta Brothers’ succeed in criminal business

Even smaller criminal groups are using smart business tactics to help insulate them from risk, such as the Vendetta World online shop, which sells credit…

73% of companies using vulnerable end-of-life networking devices

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000…

NY regulation aims to raise bank security standards

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation — and, so far, security experts…

As migration anniversary approaches, only a third of retailers accept chip cards

Retailers were supposed to start accepting chip cards last October, but a year past the start of the EMV liability shift, two-thirds still haven’t done…

Performance, management and privacy issues stymie SSL inspections, and the bad guys know it

The technology is there for companies to inspect the SSL traffic going in and out of their networks, but performance, management and privacy concerns combine…

A single ransomware network has pulled in $121 million

A single ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million…

NTP reflection attacks hit record high

Distributed denial of service attacks that take advantage of misconfigured NTP servers were up 276 percent last quarter compared to the same time last year,…

Ransomware prevalent in cloud-based malware

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to…

Half of network management systems vulnerable to injection attacks

Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half…

New tech can help catch spearphishing attacks

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.Everything about the letter…

Report: Smartphone infection rate doubled in first half of 2016

Smartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015,…

Crooks are selling a skimmer that works on all chip card readers

Think that your new EMV-compliant chip-reading point of sale terminal will keep crooks from stealing your customer credit card info?Think again.Researchers have spotted a website…

Deception technology grows and evolves

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…