Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

WhatsApp (1)

microsoft keyboard

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard has quiet-touch keys, and the full-size ambidextrous mouse provides comfortable, precise navigation. The Wireless Desktop 900 also includes Advanced Encryption Standard to help protect your...

video

How to recover your system from a Ransomware attack

After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups

video

What a Locky Ransomware attack looks like

CSO Online's Steve Ragan infects a laptop with Locky Ransomware

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72% for the holidays. Use our link and see the discount applied when you click "buy now".

nest camera

15% off Nest Cam Indoor Security Camera - Deal Alert

With Nest Cam Indoor, you can check in -- even when you’re out. 24/7 live streaming. No dead batteries. And a versatile magnetic stand that lets you put it anywhere. Nest Cam is currently discounted 15% on Amazon.

Digital Key encryption

Encrypted messaging app Signal uses Google to bypass censorship

Developers of the popular Signal secure messaging app have started to use Google's domain as a front to hide traffic to their service and to sidestep blocking attempts.

video

IDG Editors predict tech trends for 2017

Top editors from IDG Enterprise brands Computerworld, Network World, CIO and CSO chime in with their thoughts and predictions for enterprise technology trends in the upcoming year. From Apple to VR, we've got thoughts on what will be...

video

5 technologies that will shake things up in 2017

If you thought 2016 was a fun time to be in IT, wait until 2017 hits. Network World presents an overview of five technologies and trends that will "shake things up" in the world of enterprise networking for the new year.

security lock code

New report says Android phones by Lenovo and others may be running spyware apps

The backdoor access, which sends personal information to China, was originally discovered in the Blu R1 HD.

video

Making diversity in tech work for you

Diversity is not a “right thing to do” or a “feel good” issue; it is integral to the workplace. Diversity—whether it’s color, gender, class, age, or background—is critical to making great products, supporting a global user base, and...

3 outlet plug

49% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert

This compact surge protector provides 600 joules of protection, 3 outlets, and a folding wall tap plug. Two USB ports (2.1 Amp) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices.

BlackBerry

BlackBerry stops making phones, licenses the BlackBerry name to TCL for Android phones

A week after BlackBerry officially pulled out of the smartphone market, it has agreed to license its brand to handset manufacturer TCL.

video

Security Sessions: Ransomware as a service on the rise

In this episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stu Sjouwerman, CEO of KnowBe4, about how cybercriminals are using the cloud model for ransomware development.

airdroid
Update

Severe AirDroid vulnerability exposes users, patch incoming

Sand Studio says the update fixes a serious security issue in the latest release that exposed personal information to attackers.

video

Security Sessions: Lessons learned from the Dyn DNS attacks

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Stephen Boyer, CTO and co-founder of BitSight, about the recent DNS attacks against Dyn, and how CSOs can prepare their systems against future...

android malware

Gooligan worms its way into Android phones, compromises one million Google accounts

The malware is contracted by downloading apps from third-party stores.

video

How to protect the C-suite from spear phishing

CSO Editor-in-Chief Joan Goodchild sits down with Kevin O'Brien, founder and CEO of GreatHorn, to discuss ways that security leaders can fend off spear phishing attempts aimed at the executives at their companies.

video

IBM opens 'cyber-range' to practice security battles

IBM Security has launched a network-emulation environment where corporate teams can play out attack scenarios so they are better prepared for incidents they might face in the real world.

Load More
Top Tips
Our favorite Android hints and tricks