Sat.Oct 22, 2016 - Fri.Oct 28, 2016

article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

article thumbnail

Top 5 Causes of Data Loss. Google Workspace Security Tips

Spinone

Data loss should not be considered as an avoidable accident, as it is almost inevitable that any type of business may be exposed to data loss risks. This article presents cybersecurity tips on the top 5 causes of data loss. Instead, it’s important to have an action plan in place that considers all different risks […] The post Top 5 Causes of Data Loss.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lessons Learned: E-Learning Company Faces $50,000 Spam Fine

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) has issued its first Compliance and Enforcement Decision* under Canada’s Anti-Spam Law (CASL). The Commission […].

article thumbnail

Social Engineering – The Mental Game, Part II.

NopSec

Now, let’s talk technical. Malicious executable are used to deliver a payload to a victim. These can be very technical packages that can be used for remote access to the victim’s host or can be much simpler making the attack footprint and code smaller by simply prompting the user for a response. Email attachments are one of the best known social engineering attack vectors.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Hacking 167
article thumbnail

Top 5 Causes of Data Loss. G Suite Security Tips

Spinone

Data loss should not be considered as an avoidable accident, as it is almost inevitable that any type of business may be exposed to data loss risks. This article presents cybersecurity tips on the top 5 causes of data loss. Instead, it’s important to have an action plan in place that considers all different risks and scenarios and ensures that any lost data can be restored quickly in the event of a data loss disaster.

Backups 40

More Trending

article thumbnail

Dyn DDoS attack: 5 takeaways on what we know and why it matters

Tech Republic Security

On October 21, a Distributed Denial of Service attack on Dyn took many key web properties such as Twitter and Netflix offline. Here are some more details on the attack and the breadth of its impact.

DDOS 163
article thumbnail

Why big data leaders must worry about IoT security

Tech Republic Security

The security risks associated with IoT devices cannot be ignored. If your big data plans include IoT devices, follow these four steps to reduce your chances of a security breach.

Big data 161
article thumbnail

Experts share their cybersecurity horror stories

Tech Republic Security

From IoT hacks to economic collapse, four security executives share their scariest hacking and attacking scenarios and shine a light on emerging cyber-threats.

IoT 165
article thumbnail

10 programs to help you break into a cybersecurity career

Tech Republic Security

Eighty-two percent of IT professionals report a shortage of cybersecurity skills at their company. Here are 10 programs spanning all education levels to help you get your start in the field.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

3 inexpensive steps to secure IoT

Tech Republic Security

IoT devices powered the attack against Dyn, causing major disruptions to certain web properties. Follow these three steps to secure your IoT devices.

IoT 151
article thumbnail

Hackable heart implants: St. Jude comes under fire for security risks

Tech Republic Security

In an ongoing legal battle between St. Jude and Muddy Waters and MedSec, new filings claim that devices created for heart issues are vulnerable to cyberattacks.

Risk 145
article thumbnail

New Mastercard feature that lets you pay with a selfie coming to North American market

Tech Republic Security

Mastercard will debut Identity Check Mobile, which allows mobile users to verify their identity for mobile payments with a selfie or fingerprint, in North America in early 2017.

Marketing 131
article thumbnail

DDoS defenses emerging from Homeland Security

Tech Republic Security

Public, private, and academic researchers are working on new ways to combat distributed denial-of-service attacks. The recent large-scale attacks are making them even more determined.

DDOS 130
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Report: Android and iOS apps both leak private data, but one is definitely worse for the enterprise

Tech Republic Security

iOS apps are actually leaking more data than Android apps, with one important qualifier: The countries where the most leaks are happening.

147
147
article thumbnail

Electronic health records: The new gold standard for cybercriminals

Tech Republic Security

Electronic health record (EHR) systems are being compromised by script kiddies, cybercriminals, self-radicalized threat actors, and nation states. Learn how and why.

133
133
article thumbnail

5 best practices for switching your site to HTTPS for improved security

Tech Republic Security

Chrome is starting to flag more pages as insecure. Here are five things every webmaster should know about HTTPS.

162
162
article thumbnail

Aerohive's new IoT security solution could have blocked Dyn DDoS attacks, company claims

Tech Republic Security

Aerohive Networks recently unveiled a new security offering to protect against network attacks from compromised IoT devices, including botnets like Mirai.

IoT 137
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

1Password: The smart person's guide

Tech Republic Security

This comprehensive guide covers all you need to know about 1Password, a leading password management app for Android, iOS, macOS, and Windows.

article thumbnail

Video: 5 things to know about ethical hacking

Tech Republic Security

Tom Merritt explains how white hat hackers keep systems safe and secure from their bad guy counterparts.

Hacking 133
article thumbnail

BlackBerry is focusing on security and software with the new DTEK60 phone

Tech Republic Security

BlackBerry's new Android phone is intended to feature security functions a step above the competition.

Software 117
article thumbnail

How to get KeepPass password protection on Android with Keepass2Android

Tech Republic Security

If you're looking for a best-in-breed password safe for Android, look no further than Keepass2Android.

Passwords 117
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.