July, 2017

article thumbnail

10 books on cybersecurity that all IT leaders should read

Tech Republic Security

Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

VPN 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Internet 103
article thumbnail

VMware Fusion Kali USB Boot

Kali Linux

VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Fighting the War with the Right Weapon: Countering Complexity with Automation

NopSec

Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

More Trending

article thumbnail

How Ransomware Hackers Cash Out Bitcoins

Spinone

Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.

article thumbnail

CopyCat malware infects 14M devices, shows 'unprecedented success rate'

Tech Republic Security

Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.

Malware 150
article thumbnail

Worried about ransomware? Here are 3 things IT leaders need to know before the next big outbreak

Tech Republic Security

It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The 3 most in-demand cybersecurity jobs of 2017

Tech Republic Security

Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.

article thumbnail

How blockchain could revolutionize IoT security

Tech Republic Security

There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.

IoT 166
article thumbnail

UN report: 50% of countries have no cybersecurity strategy in place

Tech Republic Security

Singapore and the US top the list of countries with the greatest commitment to cybersecurity. However, most other countries are lacking in their approach to cybercrime, hacking, and more.

article thumbnail

VMware NSX: The smart person's guide

Tech Republic Security

VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.

143
143
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

macOS users beware: A new and nearly undetectable malware is on the rise

Tech Republic Security

Often thought of as impenetrable, macOS is falling prey to a sneaky malware that's stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here.

Malware 135
article thumbnail

Five more ways to minimize fileless malware infections

Tech Republic Security

Beyond disabling macros, restricting unnecessary scripting languages, and being diligent about patch management, there are many other ways to protect your systems against fileless malware.

Malware 130
article thumbnail

With this $7 malware, anyone can be a hacker for cheap

Tech Republic Security

Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions.

Malware 143
article thumbnail

Massive cyberattack on US critical infrastructure will hit within 2 years, say 60% of security pros

Tech Republic Security

New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backups 130
article thumbnail

Top 5: Things to know about cloud security

Tech Republic Security

Knowing the basics of cloud security can help you pick a better cloud provider. Here are five bits of important information.

148
148
article thumbnail

Your website suffers 22 cyberattacks per day, here's how to stay protected

Tech Republic Security

New research from SiteLock reveals that no website is too small to hack. Here is the data showing who is most vulnerable, and what mediums cybercriminals use to compromise sites.

Hacking 120
article thumbnail

Video: How an IoT firewall can protect your smart office from cyber-attacks

Tech Republic Security

Leon Kuperman, CTO of CUJO IoT Security, why your small business and home office needs a firewall, and why your ISP can't protect you from bad IPs, phishing links, and sites loaded with malware.

Firewall 121
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers

Tech Republic Security

A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.

article thumbnail

Massive Amazon S3 breaches highlight blind spots in enterprise race to the cloud

Tech Republic Security

Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.

127
127
article thumbnail

IBM boosts security testing for IoT, connected cars with new services from X-Force Red

Tech Republic Security

IBM's new security testing services will help businesses find vulnerabilities in their automotive endeavors and Internet of Things deployments.

IoT 132
article thumbnail

Why enterprises are finally paying up for big data security

Tech Republic Security

Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data.

Big data 147
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.

article thumbnail

Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse

Tech Republic Security

Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that's helping countries prepare to defend themselves.

article thumbnail

These 10 US states have the highest rate of malware infections in the country

Tech Republic Security

A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.

Malware 124
article thumbnail

Devil's Ivy vulnerability could take down millions of servers and IoT devices

Tech Republic Security

A recent blog from Senrio detailed a new flaw called Devil's Ivy, found in an open source code library, that could be used to hijack security cameras and for other nefarious purposes.

IoT 113
article thumbnail

These 6 companies are the worst at giving away your data

Tech Republic Security

The Electronic Frontier Foundation's Who Has Your Back report takes a look at how tech companies share user data with the government. Here are the lowest performers.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.