Quantcast
Channel: CSO Online - Stories by Robert Lemos RSS feed
Browsing latest articles
Browse All 15 View Live

Prototype drive-by attack shows mobile threat

As smartphones increasingly hold interesting data, attackers will target the devices using known vulnerabilities in common software packages.

View Article



Cracked SpyEye cheers, worries researchers

A hacking group has released a tool to remove the copy protection for a popular bot program, an event that is both good news and bad news for end users, a security researcher said Tuesday.

View Article

Android's big security flaw, and why only Google can fix it

In August 2010, hackers bent on jailbreaking Android smartphones found a vulnerability in the way the Android debugger handled an overwhelming number of processes. The code designed to exploit the...

View Article

Many pcAnywhere systems still sitting ducks

Despite warnings from security software maker Symantec not to connect its pcAnywhere remote-access software to the Internet, more than 140,000 computers appear to remain configured to allow direct...

View Article

In Pictures: Hackers in the limelight. Scenes from Black Hat 2012

The annual security fest featured thrills and chills as the pros did their best to make everyone feel afraid

View Article


Internet of Things security check: How 3 smart devices can be dumb about the...

Internet of Things security is no longer a foggy future issue, as more and more such devices enter the market--and our lives. From self-parking cars to home automation systems to wearable smart...

View Article

How to prevent ransomware: What one company learned the hard way

In the real world, kidnapping is a risky crime--getting paid usually means getting caught. In the digital world, however, demanding ransom for data, or ransomware, is an escalating epidemic, a popular...

View Article

The easy Java and Flash security fix everyone hates to do

Quickly patching vulnerable software is key to keeping computer systems secure. Yet, consumers are increasingly leaving their systems open to attack by failing to patch two ubiquitous third-party...

View Article


3 easy steps to save yourself from stupid passwords

Passwords are stupid.

View Article


Secure your home network--and every device attached to it--in 3 simple steps

In 2014, companies announced nearly a breach every day, exposing an average of 1.1. million identities per breach.

View Article

How to prevent mobile malware in 3 easy steps

Looking only at the data provided by security firms, the world appears on the verge of a mobile malware apocalypse.

View Article

5 steps to keep your smart home from being hacked

Consumers who outfit their homes with home automation devices without considering security may be inviting hackers and thieves inside.

View Article

NFC security: 3 ways to avoid being hacked

Here's what to keep in mind as near-field communications (NFC), the technology that allows Apple iPhone users to tap and pay, takes off. By the end of 2015, more than a billion phones will have the...

View Article


The 3-step plan to make your website harder to hack

When a big website like Lenovo's gets hacked, it's news. But most such attacks take place under the radar, at smaller sites lacking the skills or time to protect themselves. Take the legions of...

View Article

Trust no one: How caller ID spoofing has ruined the simple phone call

I was walking through San Francisco when my phone buzzed. No caller ID, but the phone number was local, so I picked it up. Calling the man on the other end "irate" would be an understatement.

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images