2016

article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

article thumbnail

Electronics-sniffing dogs: How K9s became a secret weapon for solving high-tech crimes

Tech Republic Security

Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.

167
167
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

167
167
article thumbnail

Learn cybersecurity basics with these essential YouTube videos

Tech Republic Security

A hand-picked list of must-watch cybersecurity videos to help you learn the fundamentals of encryption, how hackers penetrate systems, and strong cyber-defense tactics for business.

More Trending

article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Hacking 167
article thumbnail

4 ways your company can avoid Yahoo-level stupidity in enterprise security

Tech Republic Security

Yahoo recently confirmed a leak of one billion accounts, adding to its growing list of security woes. Here are four actions your company can take to prevent a similar debacle.

article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

IoT 167
article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Risk 167
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Risk 165
article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

Gallery: The 10 biggest business hacks of 2016

Tech Republic Security

This year thousands of cyber-attacks cost companies millions in damages and exposed billions of sensitive consumer and corporate records. These are the 10 biggest business hacks of 2016.

Hacking 167
article thumbnail

2017 cybercrime trends: Expect a fresh wave of ransomware and IoT hacks

Tech Republic Security

This year companies were rocked by over 90 million cyberattacks. In 2017 the number could double. Cybersecurity expert Sameer Dixit explains how new innovation leads to increased vulnerability.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact.

DDOS 165
article thumbnail

Why big data leaders must worry about IoT security

Tech Republic Security

The security risks associated with IoT devices cannot be ignored. If your big data plans include IoT devices, follow these four steps to reduce your chances of a security breach.

Big data 163
article thumbnail

IBM and SBI Securities test bond trading on the blockchain

Tech Republic Security

SBI Securities will adopt the Hyperledger Fabric and work with IBM to test the application of blockchain technology for operational processes and security around bond trading.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

article thumbnail

Worried about identity theft? Then you should avoid these password pitfalls

Tech Republic Security

We're constantly reminded of the risks that come with bad passwords, yet many people persist in using obvious and easy-to-crack names, words, and patterns. Want to know if you're at risk?

article thumbnail

Here are the biggest IoT security threats facing the enterprise in 2017

Tech Republic Security

The coming year will bring a large-scale IoT security breach, with fleet management, retail, manufacturing, and government at the biggest risk, according to experts.

IoT 167
article thumbnail

Zero in on IT security risks by applying the 80/20 rule to vulnerability assessments

Tech Republic Security

It is impossible to defend everything; the Pareto Principle, also known as the 80/20 rule, is one way for IT security pros to determine what's most important to protect.

Risk 165
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Blockchain: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about the blockchain, the innovative technology that powers Bitcoin, Litecoin, and other cryptocurrencies.

article thumbnail

Tor: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about Tor, the onion router web browser that allows users to access the Dark Web and other encrypted websites.

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Security

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

Internet 162
article thumbnail

Facebook rolls out encryption for Messenger, but it's not as private as you think

Tech Republic Security

Facebook recently enabled end-to-end encryption for all Facebook Messenger users with an opt-in program called Secret Conversations. Here's what it means and how to use it.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

So, you’ve accomplished an organization-wide SaaS adoption. It started slow, and now just a few team members might be responsible for running Salesforce, Slack, and a few others applications that boost productivity, but it’s all finished. Or is it? Through all the benefits offered by SaaS applications, it’s still a necessity to onboard providers as quickly as possible.

article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

Hacking 161
article thumbnail

Help wanted: Universities double down on security to help fill 1 million open jobs

Tech Republic Security

Universities are increasingly including cybersecurity majors and concentrations to better prepare students to fill the many open jobs that exist globally in the field.

article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 158
article thumbnail

Apple encryption war continues: NY DA requests 400 iPhones be unlocked

Tech Republic Security

The New York district attorney recently released a report calling for smartphone manufacturers to create operating systems that allow them to more easily access user data.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Did you know that 2021 was a record-breaking year for ransomware? The days of a “once in a while” attack against businesses and organizations are over. Cyberthreats have become a serious issue. With 495.1 million attacks, the threat marked a 148% increase compared to 2020 and was the most expensive year on record! As a result, data protection needs to be a concern for most banks, businesses, and information technology specialists.