Free security resources for work-from-home employees during the COVID-19 crisis

As the world “shelters in place” amid the COVID-19 crisis, some tech companies are stepping up…

How ShiftLeft catches vulnerabilities during code development

When cybersecurity experts talk about shifting the fixing of problems to the left, they mean moving…

Credit card skimmers explained: How they work and how to avoid them

What is a credit card skimmer? In the security industry, a skimmer has traditionally referred to…

Top cybersecurity facts, figures and statistics for 2020

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world?…

4 ways 5G will change your enterprise threat model

With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider…

5 standout products from RSA 2020

The world’s largest security show, RSA, was held last week in San Francisco.  Over the week,…

Best Android antivirus? The top 8 tools

The following are the eight best business-class antivirus tools for Android, according to AV-TEST’s January 2020…

What is penetration testing? 10 hacking tools the pros use

What is penetration testing? Penetration testing is a simulated cyber attack where professional ethical hackers break…

Will spam die in 2020?

Bill Gates promised 16 years ago that the spam problem would be “solved” by 2006. As…

The clean desk test | CSO Online

Most workspaces hold sensitive documents and information that you don’t want to get into the wrong…

Sextortion group behind bomb threat spam campaign

The emailed bomb threats, which demanded up to $20,000 bitcoin payments from banks, courthouses, schools, universities,…

Apple’s App Store privacy efforts are backfiring big time

There have been some complaints recently about how the Apple App Store handles privacy. Although Apple…

Avoid malicious Outlook email forwarding

Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.Source…

Researchers find over 40,000 stolen logins for government portals

Russian cybersecurity firm Group-IB discovered login credentials for over 40,000 accounts that unlock government services in…

What is a keylogger? How attackers can monitor everything you type

Keylogger definition Keyloggers are a type of monitoring software designed to record keystrokes made by a…