Latest articles for CSO magazine

dummy-img

East European botnet targets Russian banks

Nov 3, 2015

Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception,…

dummy-img

CSOs demanding more from cybersecurity tech

Oct 30, 2015

CSOs and CISOs are becoming more powerful, and their wielding that power to demand more from their technology vendors, to throw out underperforming tech, and…

dummy-img

Despite recent moves against Adobe, 80% of PCs run expired Flash

Oct 28, 2015

Despite recent moves against Adobe Flash by Google and Firefox and its declining use by websites, Adobe Flash remains a significant security vulnerability for end…

dummy-img

Iranian hackers get tech support on forums

Oct 27, 2015

Iranian hackers are targeting Android systems using AndroRat and DroidJack remote-access Trojans, and are getting support from local-language forums.According to research released this morning by…

dummy-img

10 riskiest cloud services

Oct 27, 2015

Risky businessImage by Tobias Van Der ElstThe average employee uses 30 cloud services at work, according to cloud security vendor Skyhigh Networks.To read this article…

dummy-img

Experts urge caution when putting health data in the cloud

Oct 23, 2015

Healthcare has become a favorite target for criminals, and some medical organizations are reacting by looking at outside providers to keep their data secure. But…

dummy-img

Report: Infosec women make progress in governance, risk and compliance

Oct 22, 2015

Women account for just 10 percent of the information security workforce, a new report shows, but are making progress in governance, risk and compliance jobs.The…

dummy-img

Don’t overdo biometrics, expert warns

Oct 22, 2015

Biometric data such as fingerprint scans is being collected too widely and too casually, according to security company Protegrity USA.”Today, many of the major banks…

‘Legitimate’ rooting apps paving way for malware

‘Legitimate’ rooting apps paving way for malware

Oct 15, 2015

Companies that create tools for “rooting” Android phones may be within the law, but they may be inadvertently paving the way for malware developers.According to…

dummy-img

Advertising network takes on malvertisers

Oct 13, 2015

In the war between malvertisers and legitimate advertising networks, the bad guys seems to be winning. Attackers use real-time bidding platforms to place malicious ads…

dummy-img

Application attacks against clouds up 45%

Oct 12, 2015

Application attacks against clouds jumped 45 percent last year, according to a new report from Houston-based cloud security firm Alert Logic, Inc.The report was based…

dummy-img

Quarter of firms can’t tell how hackers get in

Oct 7, 2015

The majority of large companies have experienced a breach over the past twelve months, but almost a quarter, 23 percent, of firms do not know…

dummy-img

Average business spends $15 million battling cybercrime

Oct 6, 2015

The average U.S. company of 1,000 employees or more spends $15 million a year battling cybercrime, up 20 percent compared to last year, according to…

dummy-img

Expired certificates cost businesses $15 million per outage

Sep 30, 2015

The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage — and faces another…

dummy-img

Does security awareness training even work?

Sep 30, 2015

The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…

dummy-img

Healthcare firms three times more likely to see data breaches

Sep 23, 2015

Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning.The…

dummy-img

Debit cards lag credit cards in EMV migration, putting banks at risk

Sep 22, 2015

Three times as many credit cards will be chip-enabled by the end of the year as debit cards, making the slower banks bigger targets for…

dummy-img

Russian military attacked, possibly by Chinese cyber group

Sep 17, 2015

Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to…

dummy-img

As containers take off, so do security concerns

Sep 17, 2015

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…

dummy-img

As containers take off, so do security concerns

Sep 17, 2015

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…

dummy-img

Corebot cleverly written botnet malware with growth potential

Sep 16, 2015

There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…

dummy-img

Travel apps riddled with security flaws

Sep 15, 2015

The top 10 travel apps in the iOS and Android app stores are all riddled with security flaws, according to a new report from Bluebox…

dummy-img

Attackers go on malware-free diet

Sep 14, 2015

To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…

dummy-img

MIT scores worst in cybersecurity

Sep 10, 2015

In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…

dummy-img

Security experts mostly critical of proposed threat intelligence sharing bill

Sep 10, 2015

This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…

dummy-img

Report: breached records count down this year

Sep 9, 2015

The number of individual records compromised by data breaches has declined by 41 percent during the first half of this year, compared to the same…

dummy-img

EMV transition will still leave security gaps

Sep 8, 2015

This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments. But financial transactions aren’t going to become safer…

dummy-img

Ashley Madison still a top lure for scammers and crooks

Sep 4, 2015

The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target.Here are…

dummy-img

Court: FTC can take action on corporate data breaches

Sep 3, 2015

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…

dummy-img

Study: 81% of large health care organizations breached

Sep 2, 2015

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…