March, 2017

article thumbnail

How to establish strong microservice security using SSL, TLS and API gateways

Tech Republic Security

Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.

Risk 168
article thumbnail

Black box discovery of memory corruption RCE on box.com

Scary Beasts Security

Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bad beat: practical attacks against poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Application Security Management: Managing Vulnerabilities Throughout Secure SDLC

NopSec

How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.

Risk 52
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Tails 6.4 releases: privacy-focused operating system based on Debian Linux

Penetration Testing

Tails OS, also known as “The Amnesic Incognito Live System,” is a privacy-focused operating system based on Debian Linux. It is designed to protect your online privacy and anonymity by routing all your internet... The post Tails 6.4 releases: privacy-focused operating system based on Debian Linux appeared first on Cybersecurity News.

article thumbnail

Reflection on Working From Home

The Falcon's View

In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.

LifeWorks

More Trending

article thumbnail

Transitioning from my CISO role at DataGravity

Andrew Hay

As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.

CISO 40
article thumbnail

Yahoo confirms 32M accounts breached in 2015-2016 forged cookies attack

Tech Republic Security

In a recent annual report filed with the SEC, Yahoo confirmed that forged cookies were used to hack 32 million accounts. Here's what it means and why your company should be aware of such attacks.

article thumbnail

Your internet history is now for sale. Here's how you can protect it

Tech Republic Security

Congress has voted to repeal restrictions preventing ISPs from gathering and selling your browsing data and other personal info. Here's how you can protect yourself.

Internet 166
article thumbnail

The 21 best IT and tech memes on the Internet

Tech Republic Security

From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer

Internet 166
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

macOS malware on the rise as Apple silently patches a mysterious new threat called Proton

Tech Republic Security

No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.

Malware 166
article thumbnail

How to use OverSight to track when hackers access your webcam

Tech Republic Security

Certain Mac malware can access a user's webcam to spy on them undetected. Here's how you can use the free tool OverSight to protect yourself.

Malware 164
article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

Search the world's largest cybercrime library

Tech Republic Security

The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, prosecutors, and judges.

article thumbnail

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

Tech Republic Security

Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.

article thumbnail

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Report: Ransomware attacks grew 600% in 2016, costing businesses $1B

Tech Republic Security

Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.

article thumbnail

IBM report: Leaked records hit 4B, up 566% since last year

Tech Republic Security

Cybercriminals compromised more than 4 billion records last year, including credit cards, passwords, health information, and business documents. Here's how to stay safe.

Passwords 151
article thumbnail

New technique claims '100% protection' against internet cyberattacks

Tech Republic Security

Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.

Internet 151
article thumbnail

Bad news, Android devs: 40 percent of apps in the market are leaving sensitive backdoors exposed

Tech Republic Security

Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.

Marketing 151
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Report: Drones will impact business, but this one thing is holding them back

Tech Republic Security

A new report from the ISACA said that security and privacy are the top concerns for business leaders looking to implement drone technology in their organization.

article thumbnail

Congress just dismantled FCC rules protecting web browsing history: What it means

Tech Republic Security

Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast.

148
148
article thumbnail

How to install and use eCryptfs on Ubuntu

Tech Republic Security

If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.

article thumbnail

Here are the top 6 ways websites get hacked, according to Google

Tech Republic Security

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.

Hacking 146
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to enable https on Apache CentOS

Tech Republic Security

For some businesses, serving up websites via HTTPS is a must-have. Here's how to configure secure http Apache on CentOS.

146
146
article thumbnail

Deep packet inspection: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.

146
146
article thumbnail

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

Tech Republic Security

Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.

Hacking 144
article thumbnail

35% of LinkedIn users' passwords are weak enough to hack

Tech Republic Security

More than 63 million LinkedIn users employ common passwords, or reuse passwords, putting them at risk for cyber attacks. Here's how to protect your company.

Passwords 144
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.