January, 2017

article thumbnail

80% of IoT apps not tested for vulnerabilities, report says

Tech Republic Security

A new report from the Ponemon Institute, IBM, and Arxan claims that just 20% of IoT apps and 29% of mobile apps are actually tested for vulnerabilities, raising security concerns.

IoT 160
article thumbnail

The Kali Linux Certified Professional

Kali Linux

Introducing the KLCP Certification After almost two years in the making, it is with great pride that we announce today our new Kali Linux Professional certification - the first and only official certification program that validates one’s proficiency with the Kali Linux distribution. If you’re new to the information security field, or are looking to take your first steps towards a new career in InfoSec, the KLCP is a “must have” foundational certification.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spinbackup is Honored with Two IT Security Software Awards

Spinone

FinancesOnline – a popular business review directory where people can compare products, and read customer reviews – has honored Spinbackup with two prestigious awards. As a service with a well-designed and easy to use interface, Spinbackup has received the Great User Experience 2016 ​certificate for their IT security software category.

article thumbnail

NCS Blog: DevOps and Separation of Duties

The Falcon's View

From my NCS blog post : Despite the rapid growth of DevOps practices throughout various industries, there still seems to be a fair amount of trepidation, particularly among security practitioners and auditors. One of the first concerns that pops up is a blurted out "You can't do DevOps here! It violates separation of duties!" Interestingly, this assertion is generally incorrect and derives from a general misunderstanding about DevOps, automation, and the continuous integration/deployment (CI/CD)

InfoSec 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

2017 Outlook: Remediation Trends

NopSec

Each year, NopSec conducts a survey of IT and cybersecurity professionals to glean a snapshot of the current state of vulnerability risk management and the outlook for VRM(Vulnerability Risk Management) in the coming year. This survey lets us take the pulse of security professionals across different types of businesses and at varying levels in their organizations, and provides some benchmarking figures for infosec teams who want to know how the maturity of their VRM programs compare.

InfoSec 40
article thumbnail

A visual map of emerging cybersecurity trends

Tech Republic Security

A study by TechRepublic and data firm Affinio reveals the social media communities and influencers talking about IoT, ransomware, bots, and other cybersecurity threats.

More Trending

article thumbnail

There's a new Gmail phishing attack going around, and it's fooling everyone

Tech Republic Security

Tech professionals don't generally fall for phishing attacks: They know what to look for and when to be suspicious. One new attack, however, is even fooling the experienced.

Phishing 159
article thumbnail

49% of businesses fell victim to cyber ransom attacks in 2016

Tech Republic Security

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know.

article thumbnail

5 ethics principles big data analysts must follow

Tech Republic Security

We trust big data and its processing far too much, according to Altimeter analysts. Get tips on incorporating ethics into your analytics projects.

Big data 166
article thumbnail

Get ready for the rise of spymail, the hottest trend in email hacking

Tech Republic Security

A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.

Hacking 147
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Android users beware: New AI can crack your Pattern Lock from afar

Tech Republic Security

New research from a group of universities found that specific video and computer vision algorithm software can unlock an Android Pattern Lock in five attempts.

Software 155
article thumbnail

Massive ransomware attack takes out 27,000 MongoDB servers

Tech Republic Security

A slew of MongoDB databases were recently wiped, with attackers demanding Bitcoin payment in exchange for the data, as tracked by Norwegian developer Niall Merrigan and ethical hacker Victor Gevers.

article thumbnail

Interview with a hacker: Kapustkiy from New World Hackers

Tech Republic Security

New World Hackers claimed responsibility for the Dyn botnet attack. One of the group's database experts explains how he attacks networks, what happens to stolen data, and the mindset of a hacker.

137
137
article thumbnail

Report: Spam and cloud attacks rising, 4 steps to protect your business

Tech Republic Security

Budget concerns and a lack of talent are barriers to advancing enterprise security, according to Cisco's 2017 Annual Cybersecurity Report. Here's how you can protect your business.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to use Zarp for penetration testing

Tech Republic Security

Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal.

article thumbnail

HR managers beware: Ransomware could be your next job applicant

Tech Republic Security

A new campaign to distribute ransomware known as GoldenEye takes aim at HR departments via fake job applications. Here's how to keep your company safe.

article thumbnail

6 ways to secure air-gapped computers from data breaches

Tech Republic Security

Once upon a time, air-gapped computers were impossible to breach. That is no longer the case. Jack Wallen offers security advice for those who deploy such machines.

article thumbnail

Why the age of connected cars presents a 'very real threat' in cybersecurity

Tech Republic Security

At NAIAS 2017, experts in data management and cybersecurity discussed the risks that come with the 'internet of cars.' Here's what you should know.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Deceptive networking lures hackers with decoy data

Tech Republic Security

Deception technology, derived from military and intelligence agencies, is a method of planting decoy endpoints to confuse and slow down attackers. Then you can turn the tables in your favor.

article thumbnail

5 data security and privacy tips for iOS

Tech Republic Security

Securing privacy and data on mobile devices is always a tricky proposition, but with the right combination of settings, apps, and care, iOS users can feel safer.

Mobile 129
article thumbnail

Hackers steal 900 GB of data from phone hacking company Cellebrite

Tech Republic Security

Hackers have taken records of customer information and technical resources from Cellebrite, an organization which sells hardware designed to extract data from secured smartphones.

Hacking 119
article thumbnail

Why US government sanctioned hacking needs to be regulated

Tech Republic Security

By crossing international borders to obtain evidence to take down Dark Web marketplaces, US law-enforcement agencies are raising international ire. A researcher suggests there may be a better way.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Amazon Echo murder case raises IoT privacy questions for enterprise users

Tech Republic Security

Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things.

IoT 136
article thumbnail

Dropbox bug sends years-old deleted files back to user accounts

Tech Republic Security

A recently discovered bug affecting cloud company Dropbox resulted in data that was supposedly deleted years ago being restored back to user accounts.

article thumbnail

IBM Watson, FDA to use blockchain tech to build secure exchange for health data

Tech Republic Security

IBM Watson Health and the FDA recently signed a research initiative looking at ways to leverage the blockchain to safely share sensitive health data, starting with oncology records.

118
118
article thumbnail

How to enable two-factor authentication for your Apple ID

Tech Republic Security

A hacked Apple account can be worth a lot to a cybercriminal. Protect yourself by enabling two-factor authentication for your Apple ID.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Poll: Do you use a password manager?

Tech Republic Security

Password managers are convenient, affordable, and essential to secure your accounts. How do you lock down your sensitive business and personal data?

article thumbnail

Video: Top 5 ways to secure your IoT

Tech Republic Security

Don't let your smart bulbs and thermostats fall prey to attack by bots. Use these five tactics to secure your IoT devices.

IoT 142
article thumbnail

Gallery: The top zero day Dark Web markets

Tech Republic Security

Cyberweapons, personal data, and corporate secrets are all available on the Dark Web. But where and how is stolen data bought and sold? Our expert hacker lists some of the top illicit online markets.

Marketing 115
article thumbnail

Extra, extra! That fake news story might come with malware

Tech Republic Security

Fake news is worrying IT security pros, and there appears to be no end in sight.

Malware 165
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.