Latest articles for CSO magazine

dummy-img

CSO burnout biggest factor in infosec talent shortage

Aug 31, 2015

The real cause of the talent shortage in the information security field isn’t a lack of new people entering the profession, but retention and churn…

dummy-img

Amazon dumps Flash, and the Web is better off

Aug 28, 2015

Amazon will stop accepting Flash ads on its advertising network on Tuesday, and it will help make the entire Web more secure, security experts say.According…

dummy-img

Phishing is a $3.7-million annual cost for average large company

Aug 26, 2015

The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according to a new report from the Ponemon Institute.The report, which surveyed…

dummy-img

Most corporate risk due to just 1% of employees

Aug 26, 2015

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little…

dummy-img

LG phones most exposed to new Certifi-gate vulnerability

Aug 25, 2015

More than 70 percent of Android phones from LG have a plugin installed that exposes them to the Certifi-gate remote support app vulnerability, where a…

dummy-img

Fraud rate doubles as cybercriminals create new accounts in users’ name

Aug 25, 2015

To get more value out of stolen personal information, cybercriminals doubled their rate of account creation fraud this summer, according to a report report from…

dummy-img

Virtualization doubles the cost of security breach

Aug 24, 2015

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional…

dummy-img

Tips for protecting your business against cyber extortion

Aug 24, 2015

CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up.But that’s only one type of cyber extortion, according…

dummy-img

DRM could be making a comeback in the enterprise

Aug 21, 2015

Digital rights management might be coming back to the enterprise, experts say, as long as usability issues don’t get in the way.You might remember the…

dummy-img

Report: ISIS-related cyber war reaches Alabama

Aug 20, 2015

The war against Islamic State has resulted in a cyber attack on US soil, and other such attacks are likely, according to a new report…

dummy-img

DDoS attacks double as criminals leverage home routers, WordPress plugins

Aug 20, 2015

The number of distributed denial-of-service attacks in the second quarter of this year was more than double that of last year, according to a new…

dummy-img

CISOs facing boards need better business, communication skills

Aug 19, 2015

As information security becomes a more important topic of interest for corporate boards, CISOs are increasingly asked to step up and brief boards on cyber…

dummy-img

New IP address blacklist based on Web chatter

Aug 11, 2015

Traditionally, blacklists of malicious IP addresses are assembled using honeypots and intrusion detection systems but a new approach, analyzing chatter on the dark and open…

dummy-img

Darkhotel expands targets, ups sophistication, leverages Hacking Team exploit

Aug 11, 2015

Darkhotel — the elite spying group discovered luxury hotels’ Wi-Fi networks last year — is back with new targets, new defensive capabilities, and a new…

dummy-img

Darkhotel expands targets, ups sophistication, leverages Hacking Team exploit

Aug 11, 2015

Darkhotel — the elite spying group discovered luxury hotels’ Wi-Fi networks last year — is back with new targets, new defensive capabilities, and a new…

dummy-img

Report: IoT is the next frontier for ransomware

Aug 7, 2015

LAS VEGAS — The growth of the Internet of Things will offer new ransomware opportunities for cybercriminals, according to a report released Thursday by Symantec.Researchers…

dummy-img

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

Aug 7, 2015

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks — they also spied on several countries on behalf of Russia,…

dummy-img

Terracotta VPN hijacks servers for commercial gain

Aug 4, 2015

The Terracotta commercial VPN, marketed in China under a number of different brand names, uses hacked servers to power its network and the network has…

dummy-img

T-Mobile caught in crossfire of injected ad war with Flash Networks

Aug 3, 2015

LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads on those websites has just flared up into full-blown war,…

dummy-img

T-Mobile caught in crossfire of war over injected ads

Aug 3, 2015

UPDATE: Flash Networks comments have been added to the original story.LAS VEGAS – An ongoing conflict between website owners and ad injectors who place unwanted ads…

dummy-img

Neiman Marcus case a reminder to check your cyber coverage

Jul 31, 2015

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and…

dummy-img

Banks balance security and workflow when encrypting in the cloud

Jul 31, 2015

When financial institutions store data in the cloud, they use different kinds of encryption depending on security and workflow requirements, according to a new report…

dummy-img

Accuvant researchers to release open source RFID access tool

Jul 28, 2015

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been…

dummy-img

Google Drive phishing is back — with obfuscation

Jul 28, 2015

If you have a Google account and a stranger sends you a link to a document on Google Drive, think twice before clicking — it…

dummy-img

Stagefright vulnerability allows criminals to send malware by text

Jul 27, 2015

Vulnerabilities in Android’s “Stagefright” code allows criminals to send malware to any user via text message — and the user gets infected without even having…

dummy-img

HP: 100% of smartwatches have security flaws

Jul 27, 2015

In a recent security assessment of ten smartwatches and their iOS and Android companion applications, every single watch had at least one significant security flaw,…

dummy-img

InfoSec pros spend most time, money on self-inflicted problems

Jul 21, 2015

According to a new survey of Black Hat attendees released last week, InfoSec professionals are spending the biggest amount of their time and budgets on…

dummy-img

How to surf the Dark Web for fun and profit

Jul 20, 2015

Life is tough if you’re a criminal.Sure, one big score can set you up for life. If you’re smart and disciplined, you can retire early.…

dummy-img

Data explosion offers challenges, opportunities to security pros

Jul 17, 2015

230 million patients. 3,300 hospitals. 900,000 healthcare professionals. 98 percent of U.S. pharmacies. More than 700 different electronic health record platforms. 764 million medication histories.…

dummy-img

Regulators seek to limit security software exports

Jul 16, 2015

The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…