September, 2016

article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

IoT 167
article thumbnail

Azure Marketplace, Weekly ISO Builds

Kali Linux

Kali Linux in the Azure Marketplace Over the past couple of weeks we’ve been working on building and implementing Kali 2016.2 in the Azure Marketplace. We’re happy to announce that from today on, you can spin up a Kali machine from the Azure Marketplace. In just a few seconds, you can have a full penetration testing toolset at your fingertips for no additional cost (other than the standard Azure pricing).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CASL compliance undertakings continue to mount

Privacy and Cybersecurity Law

Another company that is well-known to consumers has agreed to enter into a compliance undertaking with the CRTC for alleged […].

article thumbnail

Six Effective Ransomware Risk Reduction Strategies

NopSec

Businesses, governments, and consumers alike need to be aware of ransomware – a type of malware that can inflict serious damage on your finances and productivity in a very short span of time. Today, we explain this category of malware: how it works, the risks it poses to your organization, and strategies for preventing an attack. How Ransomware Works Ransomware is a type of malware that deliberately interferes with the standard operation of a computer until a ransom is paid.

Risk 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

More Trending

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Security

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

Internet 161
article thumbnail

Security breaches: How small businesses can avoid a HIPAA lawsuit

Tech Republic Security

The US government recently began investigating smaller healthcare cybersecurity breaches. Here's what it could mean for your business and how you can protect your company.

article thumbnail

Apps vs. mobile websites: Which option offers users more privacy?

Tech Republic Security

Is it better to use a mobile app or the equivalent mobile website when it comes to privacy? Researchers have an answer, and offer a privacy resource that rates 50 free online services.

Mobile 155
article thumbnail

Yahoo confirms 500M accounts leaked in massive data breach

Tech Republic Security

Yahoo recently confirmed that a suspected breach in 2014 affected hundreds of millions of users, and was believed to be carried out by a 'state-sponsored actor.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware

Tech Republic Security

Eight of 12 tech decision makers polled said FBI warnings of ransomware and other cybersecurity attacks are valid, and that threats have increased in the past year.

article thumbnail

Beware: iOS 10 security flaw makes cracking encrypted backups 2,500 times easier

Tech Republic Security

Russian security firm Elcomsoft discovered the flaw, which makes brute force password cracking far easier than in iOS 9. All iPhone and iPad users need to be aware of what's at stake.

Backups 147
article thumbnail

A Pokemon Go guide infected thousands of phones

Tech Republic Security

"There's no surprise that an app as popular as Pokemon Go has spawned associated malware," said Tim Erlin, senior director of IT security and risk strategy for Tripwire.

Malware 144
article thumbnail

How to install the Yandex.Disk cloud client on Ubuntu

Tech Republic Security

Yandex.Disk is a Dropbox alternative worth checking out. If you'd like to add support for the Yandex.Disk cloud syncing solution to your Ubuntu desktop, read this tutorial.

142
142
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Security: It might not be the outside world that's the largest threat to businesses

Tech Republic Security

A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

140
140
article thumbnail

Malware downloaded every 81 seconds, says new Check Point security report

Tech Republic Security

A new report from Check Point claims that the average day in an enterprise organization is rife with malware and malicious applications.

Malware 160
article thumbnail

How machine learning and AI will 'save the entire security industry'

Tech Republic Security

Machine learning and big data have led to many advances, including some in cybersecurity. Cylance CEO Stuart McClure explained the biggest implications the technology has for security.

Big data 138
article thumbnail

Over 400,000 sensitive healthcare records leaked on the Dark Web

Tech Republic Security

Ransomware is a fast-growing digital threat. Cybersecurity expert Mark Turnage explains how companies large and small can find data on the Dark Web and protect themselves from an attack.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Understanding Android's balance between openness and security

Tech Republic Security

At the 2016 Structure Security conference, Google's Adrian Ludwig talked about the balance between keeping Android as open as possible, while also keeping it secure.

139
139
article thumbnail

What business leaders need to know about the state of cybersecurity

Tech Republic Security

At the 2016 Structure Security conference, Rally Ventures' Art Coviello gave an overview of the threat landscape and provided best practices for security professionals and developers.

article thumbnail

Accenture announces creation of an editable blockchain, but Bitcoin users need not worry

Tech Republic Security

With the help of cryptologist Dr. Giuseppe Ateniese, Accenture has discovered a way to edit blockchains. Bitcoin enthusiasts can relax: It has a completely different use.

135
135
article thumbnail

Report: The top 6 industries hit by ransomware

Tech Republic Security

Education, government, and healthcare top the list of at-risk sectors, according to a new report. Here's what you need to know to protect your company.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

How quantum computing could unpick encryption to reveal decades of online secrets

Tech Republic Security

The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.

article thumbnail

Which political party is more cybersecure?

Tech Republic Security

Cybersecurity expert Tim Bandos reveals which political party is most vulnerable, common hacking techniques, and what companies can learn from watching how the DNC and RNC respond to cyberthreats.

article thumbnail

Enterprise IoT deployment creates a target-rich environment for criminals

Tech Republic Security

Every company involved in IoT knows the systems are insecure--including Microsoft. It is working on platform solutions, but developers have to make a commitment to proactive security.

IoT 126
article thumbnail

Poll: Should Edward Snowden be pardoned?

Tech Republic Security

Is the NSA hacker a whistleblower or traitor? Hero or villain? Take our poll and tell us whether you think Edward Snowden deserves a break.

137
137
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

5 things we learned about the state of cybersecurity from Structure Security 2016

Tech Republic Security

The first annual Structure Security conference took place in San Francisco in September. Here are the top takeaways.

article thumbnail

Why operational technology must be addressed to secure industrial IoT

Tech Republic Security

At the 2016 Structure Security conference, GE's Tom Le explained how a combination of IT and OT are core to securing industrial IoT.

IoT 139
article thumbnail

Help wanted: How automation can help with the security skills gap

Tech Republic Security

Many tech jobs are going unfilled, and that number is growing in security. Jay Leek, the CISO of Blackstone, explained how CISOs can prepare for the lack of talent in the future.

CISO 117
article thumbnail

Google Allo: What business users need to know

Tech Republic Security

Google recently released its new messaging app, Allo. Here are the security and productivity features that professionals will find useful.

135
135
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.