Ransomware: The smart person's guide
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Kali Linux
AUGUST 30, 2016
We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re launching our second Kali Rolling ISO release aka Kali 2016.2. This release brings a whole bunch of interesting news and updates into the world of Kali and we’re excited to tell you all about it. New KDE, MATE, LXDE, e17, and Xfce Builds Although users are able to build and customize their Kali Linux ISOs however they wish, we often hear people comment about how they would love to see K
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
ForAllSecure
AUGUST 10, 2016
LEGIT_00004 was a challenge from Defcon CTF that implemented a file system in memory. The intended bug was a tricky memory leak that the challenge author didn't expect Mayhem to get. However, Mayhem found an unintended null-byte overwrite bug that it leveraged to gain arbitrary code execution. We heard that other teams noticed this bug, but thought it would too hard to deal with.
Elie
AUGUST 2, 2016
In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Privacy and Cybersecurity Law
AUGUST 28, 2016
On August 23, 2016, the Office of the Privacy Commissioner of Canada (OPC) released its joint report with the Office […].
Tech Republic Security
AUGUST 30, 2016
Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
AUGUST 4, 2016
If you want to use a Linux desktop or server to share files, see how simple it can be with the help of Samba.
Tech Republic Security
AUGUST 31, 2016
According to a recent report, a 2012 hack on cloud file sharing company DropBox put millions of users at risk. It also highlights the importance of good security hygiene for every employee.
Tech Republic Security
AUGUST 3, 2016
Hackers used data stolen from a gaming site to get logins to a British mobile network's site. Learn about how it happened and what you can to do protect yourself.
Tech Republic Security
AUGUST 23, 2016
Jack Wallen explains why the recently discovered SpyNote malware threat should make you squeamish about sideloading Android apps.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
AUGUST 1, 2016
Accenture and Endgame Inc. seek to detect and remove cyber threats from organizations' systems, but their solution may be only part of a strong security plan.
Tech Republic Security
AUGUST 30, 2016
A critical new Apple iOS update patches three iOS flaws that cybercriminals used to steal confidential messages and eavesdrop using device cameras and microphones.
Tech Republic Security
AUGUST 26, 2016
Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.
Tech Republic Security
AUGUST 19, 2016
Android security is a serious problem, and the Play store is a hotbed of malware. Here are a few simple tips for avoiding the wrong apps when you go looking for new ones.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
AUGUST 16, 2016
Hacking group the Shadow Brokers claim to have hacked a group widely believed to be the NSA, and will release that group's hacking tools in exchange for Bitcoin.
Tech Republic Security
AUGUST 23, 2016
As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.
Tech Republic Security
AUGUST 9, 2016
Using remote malware, keyloggers, and DDoS attacks, hacking is a collaborative enterprise, and the sinister six can knock you offline and swipe your data.
Tech Republic Security
AUGUST 8, 2016
The Obama administration is considering elevating the status of US Cyber Command and separating it from the NSA, as cyberattacks and defense become a more integral part of modern warfare.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
AUGUST 9, 2016
As hackers target Olympic fans with phishing, ransomware, and other attacks, companies must ensure employees know cybersecurity best practices to avoid becoming a victim.
Tech Republic Security
AUGUST 4, 2016
A step-by-step guide on how to download, install, and start using Tails, the world's most secure platform.
Tech Republic Security
AUGUST 4, 2016
Homeland Security Secretary Jeh Johnson said that US president Barack Obama is considering ways to improve the security around the country's electronic voting system.
Tech Republic Security
AUGUST 24, 2016
Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
AUGUST 11, 2016
On Wednesday, Google announced security warnings that display if an email sender is authenticated, in its latest initiative to welcome business users to the app platform.
Tech Republic Security
AUGUST 5, 2016
IBM X-Force Research recently noted that the Zeus Trojan variant Panda has spread to Brazil, days before the Opening Ceremony. Here's what you need to know.
Tech Republic Security
AUGUST 10, 2016
Mobile phones present a ripe attack vector for hackers, but so far we've avoided the nightmares of Windows 95. Is it just a matter of time?
Tech Republic Security
AUGUST 1, 2016
Google has furthered its encryption efforts with the use of HSTS on its core domain. Forced use of secure HTTPS connections will help protect against attacks.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
AUGUST 5, 2016
Find out which US city outranks San Francisco and New York City as offering the highest salary for information security specialists.
Tech Republic Security
AUGUST 18, 2016
Out of the box, Nextcloud servers do not run with server-side encryption. Follow these steps to enable an extra layer of security for Nextcloud.
Tech Republic Security
AUGUST 2, 2016
MobileIron's latest Mobile Security and Risk Review report shows that despite growing mobile threats, many organizations aren't responding appropriately.
Tech Republic Security
AUGUST 12, 2016
International law firm Steptoe & Johnson expanded its blockchain practice to help clients in all industries manage Bitcoin in their businesses.
Speaker: Sierre Lindgren
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Let's personalize your content