February, 2017

article thumbnail

Big data privacy is a bigger issue than you think

Tech Republic Security

When it comes to privacy, big data analysts have a responsibility to users to be transparent about data collection and usage. Here are ways to allay users' concerns about privacy and big data.

Big data 167
article thumbnail

Cracking in the Cloud with CUDA GPUs

Kali Linux

Due to increasing popularity of cloud-based instances for password cracking, we decided to focus our efforts into streamlining Kali’s approach. We’ve noticed that Amazon’s AWS P2-Series and Microsoft’s Azure NC-Series are focused on Windows and Ubuntu. The corresponding blog posts and guides followed suit. Although these instances are limited by the NVIDIA Tesla K80’s hardware capabilities, the ability to quickly deploy a Kali instance with CUDA support is appealing

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Phishing: What Everyone in Your Organization Needs to Know

NopSec

Do you feel confident that everyone in your organization could identify a phishing email that contained ransomware? What if the recipient is in a hurry and under a lot of stress – will they be aware of how sophisticated and authentic-looking a well-crafted whaling attack can be? In today’s post, we share information with the goal that it will help everyone in your organization protect themselves from phishing attacks.

article thumbnail

Introspection on a Recent Downward Spiral

The Falcon's View

Alrighty. now that my RSA summary post is out of the way, let's get into a deeply personal post about how absolutely horrible of a week I had at RSA. Actually, that's not fair. The first half of the week was ok, but some truly horrible human beings targeted me (on social media) on Wednesday of that week, and it drove me straight down into a major depressive crash that left me reeling for days (well, frankly, through to today still).

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

IBM uses Watson to fill cybersecurity gaps

Tech Republic Security

IBM's new Watson for Cyber Security, unveiled at RSA, can tap into more than 1 million security documents to help cybersecurity professionals more easily identify and mitigate potential threats.

article thumbnail

Rise of the 'accidental' cybersecurity professional

Tech Republic Security

To fill cybersecurity job shortages, a number of people, especially women, are entering the field from other careers. Here's why they might be able to help your company.

More Trending

article thumbnail

There will soon be more IoT devices in the world than people, security risks abound

Tech Republic Security

Gartner predicts that 2017 will see 8.4 billion connected devices in use worldwide. Here's how enterprise users can protect their IoT devices against security breaches.

IoT 163
article thumbnail

Free charging stations can hack your phone, here's how to protect yourself

Tech Republic Security

A recent experiment conducted by security company Authentic8 showed how lax some users are regarding their phone data. Here's how to practice good security when you need to charge.

Hacking 156
article thumbnail

Google will soon delete apps with no privacy policies from Play Store

Tech Republic Security

This week, Google warned developers whose apps collect sensitive user data, but do not include a privacy policy, that their apps are at risk of removal from the Play Store on March 15.

Risk 158
article thumbnail

Report: 55% of companies say security is biggest digital transformation challenge

Tech Republic Security

Digital transformation efforts are underway at most enterprises. But a new survey found that security and budgetary constraints are major challenges for businesses trying to achieve digital goals.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Turning to the internet to find customer support numbers? Be wary, especially for Facebook

Tech Republic Security

It makes sense to search Google for customer support numbers: They're hard to find on a website. Scammers are hoping you do just that, and they're manipulating results to put themselves at the top.

Internet 155
article thumbnail

I infected my Windows computer with ransomware to test RansomFree's protection

Tech Republic Security

Jesus Vigo went hands-on with RansomFree to see if it could outmaneuver ransomware threats and keep data safe. Here's a look at what he discovered.

article thumbnail

How to clear your cache and cookies in every major web browser

Tech Republic Security

Clearing your cache and cookies can often be a simple fix for some common web performance issues. Here's how to do it in Chrome, Safari, Firefox, Edge, and Opera.

158
158
article thumbnail

Enterprise IoT adoption to hit critical mass by 2019, but security remains a top concern

Tech Republic Security

Security breaches have impacted the vast majority of companies that have implemented IoT, according to a new study from HPE's Aruba.

IoT 165
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Google kills support for Gmail in these Chrome versions: Check if you're affected

Tech Republic Security

Google will no longer support Gmail on Chrome version 53 and below, leaving the popular service more susceptible to security risks.

Risk 165
article thumbnail

Think Apple computers are still malware immune? This new attack proves otherwise

Tech Republic Security

A newly detected malware targeting macOS devices can steal passwords and capture iPhone backups. And it's coming from the same group believed to be responsible for the 2016 election hacks.

Malware 139
article thumbnail

CIO Jury: One-third of tech leaders had trouble finding cybersecurity staff last year

Tech Republic Security

There are currently 1 million open cybersecurity jobs across the globe. Four out of 12 tech experts say they experienced difficulties finding skilled security staff in the past year.

article thumbnail

De-anonymizing web-browsing histories may reveal your social media profiles

Tech Republic Security

Researchers from Princeton and Stanford explain how linking social media profiles to web-browsing activity may threaten the anonymization of browsing histories and lead to a cyberattack.

Media 134
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

10 ways to reduce insider BYOD threats

Tech Republic Security

Employees benefit by using their own devices for work, but there can be security risks as well. Here are some ways to control or reduce these threats.

Risk 144
article thumbnail

5 easily installed utilities for improving your online privacy

Tech Republic Security

You can't go far in the world of tech news without running into a headline about data breaches or hacks. Shore up your defenses by installing these five apps.

article thumbnail

Everything old is new again: Experts predict a flood of denial-of-service attacks

Tech Republic Security

As IoT goes mainstream Mirai-style denial-of-service botnet attacks are escalating, and hackers are targeting health care companies, financial services, and the government.

article thumbnail

How to install and use Let's Encrypt on a Ubuntu Server for SSL security

Tech Republic Security

If you're looking for an easy way to install SSL certificates on your Ubuntu Server, follow this incredibly simple process to use Let's Encrypt.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Dozens of iOS apps vulnerable to data theft, despite ATS mandate

Tech Republic Security

A new report from verify.ly found that 76 popular iOS apps allow a silent man-in-the-middle attack that can intercept data. Here's what you need to know to stay safe.

131
131
article thumbnail

Wanted: White hat hackers to break new automotive software updater code

Tech Republic Security

Over-the-air software updates for cars is a security risk. Researchers who developed an open source software update framework for cars are asking security experts to help find flaws in its code.

Software 127
article thumbnail

These 10 cities have the worst malware infection rates in the US

Tech Republic Security

Tampa, Orlando, and St. Louis top the list of US cities with the highest rates of malware infections in 2016, according to a new report.

Malware 147
article thumbnail

How to add two-factor authentication to your WordPress site

Tech Republic Security

If you employ WordPress for your personal or company sites, you owe it to yourself to set up two-factor authentication. Here's how.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise

Tech Republic Security

Mobile malware attacks increased more than three times between 2015 and 2016, according to a new report from Kaspersky Lab. Here's what you need to know.

Mobile 135
article thumbnail

How to make Apache more secure by hiding directory folders

Tech Republic Security

If you serve up your websites with Apache, you might want to prevent the server from listing subdirectories. Here are two simple tricks for securing your Apache server.

128
128
article thumbnail

Report: Data breaches growing more complex, causing more damage

Tech Republic Security

Verizon's latest Data Breach Digest report claims that data breaches are affecting more parts of organizations and becoming more sophisticated. Here's how you can respond.

article thumbnail

FBI agent explores how social engineering attacks get a boost from social media

Tech Republic Security

Cybercriminals use social networking outlets to tailor their social engineering attacks, increasing their chance of success. A solution is in the works to mitigate the effects of these threats.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.