August, 2016

article thumbnail

Ransomware: The smart person's guide

Tech Republic Security

This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

article thumbnail

Kali Linux 2016.2 Release

Kali Linux

We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re launching our second Kali Rolling ISO release aka Kali 2016.2. This release brings a whole bunch of interesting news and updates into the world of Kali and we’re excited to tell you all about it. New KDE, MATE, LXDE, e17, and Xfce Builds Although users are able to build and customize their Kali Linux ISOs however they wish, we often hear people comment about how they would love to see K

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mayhem Wins DARPA CGC

ForAllSecure

Mayhem is a fully autonomous system for finding and fixing computer security vulnerabilities.On Thursday, August 4, 2016, Mayhem competed in the historical DARPA Cyber Grand Challenge against other computers in a fully automatic hacking contest.and won. The team walked away with $2 million dollars, which ForAllSecure will use to continue its mission to automatically check the world's software for exploitable bugs.

article thumbnail

What are malicious usb keys and how to create a realistic one?

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Impact of the European General Data Protection Regulation (GDPR) on Adequacy and 5 Tips to Weather the Changes

Privacy and Cybersecurity Law

Recent media coverage has brought to light the internal deliberations of the Government of Canada regarding the possible impact of […].

Media 40
article thumbnail

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside.

More Trending

article thumbnail

Update all iOS devices to 9.3.5 immediately, or risk a remote jailbreak

Tech Republic Security

A critical new Apple iOS update patches three iOS flaws that cybercriminals used to steal confidential messages and eavesdrop using device cameras and microphones.

Risk 111
article thumbnail

The Hacking Teams: who they are, what they want, and how they hack

Tech Republic Security

Using remote malware, keyloggers, and DDoS attacks, hacking is a collaborative enterprise, and the sinister six can knock you offline and swipe your data.

Hacking 113
article thumbnail

How to avoid falling victim to Android app scams on Google Play

Tech Republic Security

Android security is a serious problem, and the Play store is a hotbed of malware. Here are a few simple tips for avoiding the wrong apps when you go looking for new ones.

Scams 106
article thumbnail

How to avoid credential stuffing attacks

Tech Republic Security

Hackers used data stolen from a gaming site to get logins to a British mobile network's site. Learn about how it happened and what you can to do protect yourself.

Mobile 109
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

2012 Dropbox hack worse than realized, 68M passwords leaked

Tech Republic Security

According to a recent report, a 2012 hack on cloud file sharing company DropBox put millions of users at risk. It also highlights the importance of good security hygiene for every employee.

Hacking 102
article thumbnail

How Obama administration plans to prevent rigged elections

Tech Republic Security

Homeland Security Secretary Jeh Johnson said that US president Barack Obama is considering ways to improve the security around the country's electronic voting system.

101
101
article thumbnail

Stolen iPhones could eventually capture photo and fingerprint of thieves

Tech Republic Security

Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.

100
100
article thumbnail

How to mitigate ransomware, DDoS attacks, and other cyber extortion threats

Tech Republic Security

Ransomware and other forms of cyber extortion are effective moneymakers for the bad guys. Learn why, and how not to fall prey to digital extortionists.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Rio Olympics 2016: How to keep your employees safe from the biggest scams at the summer games

Tech Republic Security

As hackers target Olympic fans with phishing, ransomware, and other attacks, companies must ensure employees know cybersecurity best practices to avoid becoming a victim.

Scams 98
article thumbnail

Hackers claim to have stolen cyberweapons from NSA, demand 1 million Bitcoin in exchange

Tech Republic Security

Hacking group the Shadow Brokers claim to have hacked a group widely believed to be the NSA, and will release that group's hacking tools in exchange for Bitcoin.

Hacking 100
article thumbnail

Google makes Gmail safer with new security warnings to fight phishing

Tech Republic Security

On Wednesday, Google announced security warnings that display if an email sender is authenticated, in its latest initiative to welcome business users to the app platform.

article thumbnail

How to set up quick and easy file sharing with Samba

Tech Republic Security

If you want to use a Linux desktop or server to share files, see how simple it can be with the help of Samba.

123
123
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Google finally adds HSTS encryption to google.com

Tech Republic Security

Google has furthered its encryption efforts with the use of HSTS on its core domain. Forced use of secure HTTPS connections will help protect against attacks.

article thumbnail

IBM X-Force finds major malware hitting Brazil banks ahead of 2016 Olympics in Rio

Tech Republic Security

IBM X-Force Research recently noted that the Zeus Trojan variant Panda has spread to Brazil, days before the Opening Ceremony. Here's what you need to know.

Banking 99
article thumbnail

Report: 82% of hospitals fear they aren't prepared for mobile cyberattacks

Tech Republic Security

As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.

Mobile 96
article thumbnail

Stop procrastinating: Signing emails is now a necessity

Tech Republic Security

If employees don't digitally sign all outgoing emails, Jack Wallen says your company and customer base is at risk. He explains why signing emails has reached critical importance.

Risk 88
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

How to enable two-factor authentication on Nextcloud 10

Tech Republic Security

If you're running a Nextcloud 10 server and worrying about security, follow these steps to set up two-factor authentication and add an extra layer of protection for your users' data.

article thumbnail

Rio Olympics 2016: How hackers are still using the games to scam businesses

Tech Republic Security

Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.

Scams 94
article thumbnail

Android Security Bulletin August 2016: What you need to know

Tech Republic Security

The Android Security Bulletin for August 2016 includes only one Critical issue, and a few issues marked High and Moderate. Get the highlights, and learn how to find out if your device is up to date.

85
article thumbnail

Why threat hunting as-a-service is worth considering, but 'not a silver bullet'

Tech Republic Security

Accenture and Endgame Inc. seek to detect and remove cyber threats from organizations' systems, but their solution may be only part of a strong security plan.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

New MobileIron report details most common mobile threats and blacklisted apps

Tech Republic Security

MobileIron's latest Mobile Security and Risk Review report shows that despite growing mobile threats, many organizations aren't responding appropriately.

Mobile 91
article thumbnail

Why haven't we seen the smartphone security apocalypse in iPhone and Android yet?

Tech Republic Security

Mobile phones present a ripe attack vector for hackers, but so far we've avoided the nightmares of Windows 95. Is it just a matter of time?

Mobile 95
article thumbnail

Cloud Security Alliance releases top 100 big data best practices report

Tech Republic Security

The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.

article thumbnail

Safety first: The best use of the public cloud for analytics apps and data

Tech Republic Security

If concerns about data breaches have kept your organization from using the public cloud, read about use cases in which these worries should be a thing of the past.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.