Lucian ConstantinCSO Senior Writer, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for CSO.

security code big data cyberespionage DDoS

Armies of hacked smart devices launch unprecedented DDoS attacks

The botnets made up of compromised IoT devices are now capable of launching distributed denial-of-service attacks of unprecedented scale.

Yahoo

Here's what you should know, and do, about the Yahoo breach

Yahoo's announcement that state-sponsored hackers have stolen the details of at least 500 million accounts shocks both through scale -- it's the largest data breach ever -- and the potential security implications for users.

yahoo mail

Yahoo is expected to confirm massive data breach affecting hundreds of millions of users

Yahoo is reportedly preparing to confirm a data breach that affects hundreds of millions of accounts.

security code big data cyberespionage DDoS

More than 840,000 Cisco devices are vulnerable to NSA-related exploit

More than 840,000 Cisco networking devices from around the world are affected by a recently discovered vulnerability that's similar to one exploited by a hacking group believed to be linked to the U.S. National Security Agency.

os1012 siridocsearch pr print

Appleā€™s new macOS Sierra fixes over 60 security flaws

Aside from new and interesting features, macOS Sierra 10.12 has a large number of important security fixes.

Digital Key, security, encryption

TLS 1.3 gets early adoption boost through CloudFlare

Website security and performance vendor CloudFlare has made the newest version of the TLS secure communications protocol available to all of its customers.

Tesla Model S

Researchers hack Tesla Model S with remote attack

Researchers from Chinese technology company Tencent found a series of vulnerabilities that, when combined, allowed them to remotely take over a Tesla Model S car.

20151005 Cisco headquarters sign

Cisco patches Equation group exploit in IOS, IOS XE and IOS XR devices

Cisco Systems has patched a vulnerability similar to one exploited by a cyberespionage group believed to be linked to the U.S. National Security Agency.