June, 2016

article thumbnail

Is the Intel Management Engine a backdoor?

Tech Republic Security

Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.

article thumbnail

How google helps 600,000 webmasters re-secure their hacked sites every year

Elie

Every year, close to 600,000 sites are hacked. Given the scale of the problem, notifying users to prevent harm and webmasters so they can clean up their sites is critical to combat hacking. This post looks at the effectiveness of the current warning strategies used by Google and their long-term impact.

Hacking 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What does BREXIT mean for data protection?

Privacy and Cybersecurity Law

On 23 June 2016, the UK is holding a referendum as to whether to stay in the European Union or […].

40
article thumbnail

1.2 million infected: Android malware 'Hummer' could be biggest trojan ever

Tech Republic Security

Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps.

Malware 113
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Clinton allegedly hacked again, and documents leaked from DNC attack

Tech Republic Security

The Clinton Foundation's network was allegedly hacked late Tuesday, while a variety of documents from last week's DNC hack were leaked simultaneously, pushing cybersecurity toward center stage.

Hacking 104
article thumbnail

Report: New security threats costing businesses $1 million an incident, flash performance suffers

Tech Republic Security

A new report from EMC shows that businesses are tackling traditional cybersecurity issues better, but they are failing to address emerging threats.

More Trending

article thumbnail

How to set up Authy on multiple devices for more convenient two-factor authentication

Tech Republic Security

One device to hand out two-factor authentication tokens isn't always enough. Learn how to use Authy on multiple devices so those tokens are always at the ready.

article thumbnail

Why antivirus programs have become the problem, not the solution

Tech Republic Security

Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.

Antivirus 113
article thumbnail

Hurricane preparedness gets high tech in Fort Myers, Florida

Tech Republic Security

In the heart of Florida's hurricane country, Lee County's Emergency Operations Center uses cutting-edge networking and communications solutions to prepare for any emergency.

95
article thumbnail

WWDC 2016: Apple to require HTTPS encryption on all iOS apps by 2017

Tech Republic Security

At a session at the 2016 WWDC, Apple revealed that it would be requiring all iOS apps to use HTTPS connections through an existing feature called App Transport Security by the end of the year.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to install SparkleShare on Ubuntu and connect it to GitHub

Tech Republic Security

Collaboration and remote sync are a necessity for developers. Learn how to make the process easier by using SparkleShare to connect to a GitHub repository.

94
article thumbnail

Google My Activity site reveals all the data that's been collected about your online habits

Tech Republic Security

Google recently launched a new page called My Activity that shows you a history of your online activities and interactions with its products.

97
article thumbnail

Ethical hackers: How hiring white hats can help defend your organisation against the bad guys

Tech Republic Security

Businesses and government organisations are starting to recruit ethical hackers to ensure their security processes are up to scratch.

article thumbnail

Why data-driven analysis must inform healthcare IT security decisions

Tech Republic Security

An Information Security manager makes the case for an analytical approach to stem the staggering number of data breaches suffered by the healthcare industry.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Armorway grabs $2.5 million to expand AI security platform

Tech Republic Security

AI startup Armorway recently announced a round of seed funding that it will use to deliver predictive analytics for security threats.

98
article thumbnail

Former NSA and CIA director recommends managing consequences instead of vulnerabilities

Tech Republic Security

Michael Hayden believes managing vulnerabilities is untenable and consequence management using the Risk Equation is preferable. Read about the equation's components.

Risk 84
article thumbnail

Chinese cybersecurity breaches drop 90%, but expert warns not to let guard down

Tech Republic Security

A report from US network security FireEye recently showed that breaches attributed to China-based groups dropped dramatically over the past two years.

article thumbnail

Skyrocketing Android ransomware has quadrupled over past year, says new report

Tech Republic Security

A Kaspersky Lab reports Android ransomware is booming, quadrupling over the past year alone, shedding light on the growing problem of non-PC ransomware.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How to create a self-signed certificate to use on Apache2

Tech Republic Security

Follow these steps to generate and install a self-signed certificate to be used on Apache2.

106
106
article thumbnail

Developers will cheat on their cloud provider for better security, new survey says

Tech Republic Security

Security is the top reason developers consider jumping to a new cloud, along with better reliability and a better user experience, according to a new survey by Evans Data.

73
article thumbnail

Research: Apple rated highest for security on mobile devices

Tech Republic Security

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

Mobile 72
article thumbnail

Survey: Declaring cyberwar on cybersecurity threats

Tech Republic Security

Cybersecurity is a key issue, with digital forensics teams arming organizations against the threat of data breaches and network security. Take our survey and get a free copy of the research report.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Election Tech: What happens when presidential candidates are hacked

Tech Republic Security

The DNC and Clinton Foundation were targeted recently by hacker groups. Cybersecurity experts explain why organizations are targeted, the value of data, and how to protect yourself and your business.

Hacking 67
article thumbnail

The not-so-cute side of emojis: Potential security, privacy, and bandwidth issues

Tech Republic Security

Those adorable emojis may could lead to serious enterprise headaches. Jack Wallen makes the case for why emojis have no place in the business world.

72
article thumbnail

VMware ratchets up endpoint security and bolsters device management features

Tech Republic Security

VMware has made a host of announcements to enhance the security of its end user computing products and added new partners to its Mobile Security Alliance.

Mobile 66
article thumbnail

How to use the Nylas PGP plugin to encrypt/decrypt N1 email

Tech Republic Security

If you passed on the Nylas N1 email app because of security concerns, put those fears aside because PGP encryption is now integrated into the tool.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Three important security upgrades to Android N

Tech Republic Security

Jack Wallen thinks the "N" in Android N stands for Next Level, because Google provides next-level security improvements.

68
article thumbnail

Apple File System revealed at WWDC 2016, focused on encryption and SSD support

Tech Republic Security

Apple recently announced the new Apple File System (APFS), replacing the decades-old HFS system.

article thumbnail

Security researchers' smart home findings may keep you up at night

Tech Republic Security

See how hackers can unlock smart home door lock codes and more in these proof-of-concept attacks.

72