How-To Geek

Cybersecurity

Page 2

Readers like you help support How-To Geek. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
A hand holding up a smartphone displaying the Uber logo. 1
Samsung logo sign. 1
Samsung Just Had a Data Breach

Not another one.

By 
Lastpass on a phone screen 1
LastPass Just Had a Security Breach

Nothing is bulletproof on the Internet.

By 
PayPal logo 1
PayPal Invoice Scams Aren't Going Away: Here's How to Avoid Them

Scammers are using PayPal's invoice system to send payment emails that look real.

By 
 1
Web
BadUSB: The Cyber Threat That Gets You To Plug It In

A recent spate of USB-based cyberattacks has hit organizations in the US.

By 
 1
How to Find Vulnerabilities In Containers and Files With Grype

Grype is an open-source vulnerability scanner that finds weaknesses within container images and filesystem directories.

By 
 1
How to Detect and Defeat Cryptominers in Your Network

Mining for cryptocurrency isn't illegal.

By 
 1
How to Check If Your Server Is Vulnerable to the log4j Java Exploit (Log4Shell)

A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it.

By 
 1
Web
Critical RCE Zero-Day Exploit Found in Popular Java Logging Library log4j, Affects Much Of The Internet

A critical remote code execution vulnerability has been found in log4j, a very popular logging tool used by most of the industry.

By 
 1
How the SAML Standard Provides Single Sign-On Services

Single Sign-On and zero trust networks depend on securely passing identification details back and forth between users, identity providers, and service providers.

By 
 1
How to Security Scan Docker Images With Anchore

Anchore Engine is an open-source scanning tool that assesses the security of your Docker images.

By 
 1
How Docker Image Signing Will Evolve With Notary v2

Signed Docker images enhance ecosystem trust and security by letting users check the images they download really originate from you.

By 
 1
How to Harden Docker Images For Maximum Security

There are many factors that contribute towards your Docker security posture but using hardened images is one of the best steps you can take to protect yourself.

By 
 1
What Is RansomCloud, And How Do You Protect Yourself?

RansomCloud is ransomware designed to infiltrate and encrypt cloud storage.

By 
 1
Why the Google-Backed Secure Open Source Program is So Important

Supply chain attacks are skyrocketing, and open-source projects are the most common point of infiltration.

By 
 1
Web
What Does It Mean to "Shift Security Left?"

"Shift left security" refers to a software development model which fully considers security from the outset.

By 
 1
Web
How Deepfakes Are Powering a New Type of Cyber Crime

Making deepfakes is getting easier, and they're more convincing than ever.

By 
 1
Web
Why Compliance Complacency is Another Form of Technical Debt

Technical debt comes in three forms.

By 
 1
Web
Penetration Testing Has More Benefits Than You Think

Penetration testing measures the effectiveness of your cybersecurity defensive measures.

By 
 1
Web
What is Data Scraping, And Why Is It a Threat?

Data scraping is yet another way data can be extracted from your website, portal, or platform.

By 
1 2 3 4
Page 2 / 4
See more articles +