Latest articles for CSO magazine

dummy-img

Performance, management and privacy issues stymie SSL inspections, and the bad guys know it

Sep 19, 2016

The technology is there for companies to inspect the SSL traffic going in and out of their networks, but performance, management and privacy concerns combine…

dummy-img

A single ransomware network has pulled in $121 million

Sep 14, 2016

A single ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million…

dummy-img

NTP reflection attacks hit record high

Sep 14, 2016

Distributed denial of service attacks that take advantage of misconfigured NTP servers were up 276 percent last quarter compared to the same time last year,…

dummy-img

Ransomware prevalent in cloud-based malware

Sep 8, 2016

Cloud-based filesharing, collaboration and social networking applications are common vectors for malware infections, a large portion of of which are ransomware delivery vehicles, according to…

dummy-img

Half of network management systems vulnerable to injection attacks

Sep 7, 2016

Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half…

dummy-img

New tech can help catch spearphishing attacks

Sep 7, 2016

A CEO said that his controller had just received an email, ostensibly from him, asking her to process an urgent outgoing payment.Everything about the letter…

dummy-img

Report: Smartphone infection rate doubled in first half of 2016

Sep 1, 2016

Smartphone infection rates nearly doubled during the first half of this year, from 0.25 percent to 0.49 percent compared to the second half of 2015,…

dummy-img

Crooks are selling a skimmer that works on all chip card readers

Aug 31, 2016

Think that your new EMV-compliant chip-reading point of sale terminal will keep crooks from stealing your customer credit card info?Think again.Researchers have spotted a website…

dummy-img

Deception technology grows and evolves

Aug 29, 2016

Deception technologies such as honeypots are becoming increasingly popular with enterprises as the products get more flexible and the tools allow security analysts swamped with…

dummy-img

NASA CIO allows HPE contract to expire, refuses to sign-off on authority to operate

Aug 26, 2016

In the wake of continued security problems, NASA’s CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in…

dummy-img

NASA CIO allows HPE contract’s authority to operate to expire

Aug 26, 2016

In the wake of continued security problems, NASA’s CIO is sending a no-confidence signal to Hewlett Packard Enterprise, which received a $2.5 billion contract in…

dummy-img

Experts challenge Skyhigh’s patent for cloud-based encryption gateway

Aug 25, 2016

Skyhigh announced today that it has received a patent for its technology, which moves that encryption gateway into a hosted environment. Enterprises looking to protect sensitive…

dummy-img

High-end banking malware hits Brazil

Aug 16, 2016

Brazil just can’t catch a break. We’ve already seen flesh-eating bacteria in the water, athletes getting robbed on the streets, and police officers holding up…

Cerber ransomware earns $2.3mil with 0.3% response rate

Cerber ransomware earns $2.3mil with 0.3% response rate

Aug 16, 2016

The fast-growing Cerber ransomware earned nearly $200,000 in July despite a payment rate of just 0.3 percent as a result of its affiliate distribution model,…

dummy-img

Where does text message spam come from? NUVOs

Aug 15, 2016

The major mobile networks account for 90 percent of all legitimate text message traffic — but only 38 percent of blocked spam messages. The rest…

dummy-img

Samsung both denies and admits mobile payment vulnerability

Aug 11, 2016

Security researcher Salvador Mendoza demonstrated a flaw in Samsung Pay at Black Hat last week, in which the tokens used to secure transactions could be…

dummy-img

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Aug 3, 2016

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while…

dummy-img

Insurers working to fill cyberinsurance data gaps

Aug 3, 2016

Insurance companies typically have decades of data, if not more, on which to base their risk estimates. That’s not the case with cyber risk, however.…

dummy-img

Experts: SentinelOne ransomware guarantee no replacement for cyberinsurance

Aug 1, 2016

Earlier this week, SentinelOne announced that it will reimburse customers for up to $1 million if they are hit by a ransomware attack, but some…

dummy-img

EMV transition involves many moving parts

Jul 29, 2016

The shift from magnetic stripe to chip-based payment cards was first announced in 2011, with a deadline of October 2015, but most merchants still have…

dummy-img

Many popular wireless keyboards completely unprotected

Jul 26, 2016

Earlier this year, security researchers went to their local OfficeMax, Staples and other office supply stores and bought a bunch of wireless keyboards. “We’re in…

dummy-img

Health care organizations 114 times more likely to be ransomware victims than financial firms

Jul 26, 2016

Health care organizations were 114 times more likely to hit by ransomware infections than financial firms, and 21 times more likely than educational institutions, according…

dummy-img

New HIPAA guidance addresses ransomware

Jul 20, 2016

The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need…

dummy-img

Companies failing to plan for many cyber dangers

Jul 15, 2016

Only 22 percent of companies have a comprehensive plan in place to deal with major cybersecurity incidents, according to a new survey from KPMG and…

dummy-img

Fake Olympic tickets and Zika news apps scam users

Jul 13, 2016

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the…

dummy-img

Merchants slow to migrate to EMV, see rising fraud costs

Jul 7, 2016

The cost of paying for fraudulent credit card transactions, previously covered by the credit card companies, shifted to the retailers themselves last October — unless…

dummy-img

Rio Olympics pose security risks to travelers

Jul 6, 2016

Police officers held up a sign saying “Welcome to Hell” at the Rio airport last week, according to local and international news reports, and the…

dummy-img

Dangerous keyboard app has more than 50 million downloads

Jun 29, 2016

The Flash Keyboard app has been downloaded more than 50 million times — but is capable of some extremely dangerous behaviors.”It looked like it was…

dummy-img

Study: Encryption use increase largest in 11 years

Jun 28, 2016

Enterprise use of encryption saw the largest increase over the past year in over a decade, according to a report released today by the Ponemon…

dummy-img

BYOD can pose privacy risks to employees

Jun 23, 2016

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees…