Latest articles for CSO magazine

dummy-img

Reporting to CEO reduces risks and costs, but change comes slowly

Jan 26, 2016

An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of…

dummy-img

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

Jan 25, 2016

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.”This is one of…

dummy-img

Report: Cybersecurity pros losing confidence

Jan 19, 2016

Security professionals were less confident in their security infrastructure in 2015 than in 2014, according to a report released today by Cisco.In 2014, 64 percent…

dummy-img

Linux zero-day affects most Androids, millions of Linux PCs

Jan 19, 2016

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…

dummy-img

Linux zero-day affects most Androids, millions of Linux PCs

Jan 19, 2016

A new zero-day vulnerability has been discovered that allows Android or Linux applications to escalate privileges and gain root access, according to a report released…

dummy-img

Security pros worried about stolen credentials, alert volumes

Jan 13, 2016

The majority of security organizations received more alerts than they can handle and don’t have a way to spot stolen credentials, according to a survey…

dummy-img

RIG exploit kit takes over while Angler on vacation

Jan 12, 2016

The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure…

dummy-img

DDoS attack on BBC may have been biggest in history

Jan 8, 2016

Last week’s distributed denial of service attack against the BBC website may have been the largest in history.A group calling itself New World Hacking said…

dummy-img

Silent Circle patches Blackphone vulnerability

Jan 6, 2016

A report released this morning shows that no phone is 100 percent secure — but that one company, at least, is able to respond quickly…

dummy-img

Global geopolitical risk predictions for 2016

Jan 4, 2016

The previous 25 years have been marked by globalization. A number of forces acted together to bring our planet closer together. Trade pacts, peacekeeping alliances,…

dummy-img

PhishMe report shows employees can become assets in anti-phishing battle

Dec 21, 2015

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

dummy-img

PhishMe report shows employees can become assets in anti-phishing battle

Dec 21, 2015

A report released today by PhishMe based on the results of 8 million phishing simulations shows that employees can dramatically improve their ability to detect…

dummy-img

Lost devices account for bulk of healthcare security incidents

Dec 16, 2015

Due to reporting guidelines, lost and stolen devices account for 45 percent of all breaches in Verizon’s new health care data breach report, accounting for…

dummy-img

Firms expect fines, new costs from Safe Harbor changes

Dec 14, 2015

IT budgets are expected to see a rumble of activity in the wake of the Safe Harbor earthquake.In a new Ovum survey of IT decision…

dummy-img

Darkode forum is back, but a shadow of its former self

Dec 8, 2015

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

dummy-img

Darkode forum is back, but a shadow of its former self

Dec 8, 2015

Last summer, law enforcement agencies from 20 countries joined forces to shut down the notorious Darkode hacking forum. Organizers said they would be back, stronger…

dummy-img

US cyber criminal underground a shopping free-for-all

Dec 7, 2015

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…

dummy-img

US cyber criminal underground a shopping free-for-all

Dec 7, 2015

According to a new report by Trend Micro, the North American cyber criminal underground isn’t buried as deep as in other geographies. “It doesn’t exist…

dummy-img

Report: Scripting languages most vulnerable, mobile apps need better crypto

Dec 3, 2015

According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…

dummy-img

Report: Scripting languages most vulnerable, mobile apps need better crypto

Dec 3, 2015

According to an analysis of over 200,000 applications, PHP is the programming language with the most vulnerabilities, mobile apps suffer from cryptography problems, and developers…

dummy-img

Most hackable devices

Nov 30, 2015

Consumer devices vulnerableThere are now more than 3 billion connected devices in use by consumers, according to Gartner, and this number will increase to 4…

dummy-img

Retailers targeted by sophisticated ModPOS malware

Nov 24, 2015

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely…

dummy-img

OpenDNS listens for malicious melodies

Nov 19, 2015

Much like Pandora identifies patterns in music to come up with new songs that its users might like, OpenDNS is listening to the traffic patterns…

dummy-img

New ad-fraud botnet targets major corporations, universities

Nov 18, 2015

A new botnet is specifically targeting large corporations, taking over user machines to generate high-value ad fraud, according to a new report from Pixalate.The Xindi…

dummy-img

Exploit kit activity up 75 percent in third quarter 2015

Nov 18, 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to…

dummy-img

The dark side of layered security

Nov 13, 2015

Layered security is currently considered a best practice for enterprises, since a single layer of defense against attackers is no longer enough. Sometimes, however, these…

dummy-img

iOS apps more vulnerable than Android

Nov 10, 2015

Applications written for iOS devices have more vulnerabilities than those written for Androids, and this has the potential for security problems in the future as…

dummy-img

10 riskiest applications that have passed their expiration dates

Nov 10, 2015

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

dummy-img

10 risky software that have passed their expiration dates

Nov 10, 2015

ExpiredImage by ThinkstockApplications that have reached the ends of their lives are no longer maintained by their original developers, and do not receive security updates.…

9 of 10 directors support regulator action on cybersecurity

9 of 10 directors support regulator action on cybersecurity

Nov 5, 2015

In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven’t…