Sat.Dec 03, 2016 - Fri.Dec 09, 2016

article thumbnail

Electronics-sniffing dogs: How K9s became a secret weapon for solving high-tech crimes

Tech Republic Security

Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.

167
167
article thumbnail

Do Games Teach Security?

Adam Shostack

There’s a new paper from Mark Thompson and Hassan Takabi of the University of North Texas. The title captures the question: Effectiveness Of Using Card Games To Teach Threat Modeling For Secure Web Application Developments. Gamification of classroom assignments and online tools has grown significantly in recent years. There have been a number of card games designed for teaching various cybersecurity concepts.

Software 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[1day] [PoC with $rip] Deterministic Linux heap grooming with huge allocations

Scary Beasts Security

Overview In a previous blog post, I disclosed CESA-2016-0002 , an 0day vulnerability (without exploit) in the vmnc decoder of the gstreamer media subsystem, which is installed by default in Fedora. Because a Fedora fix was somewhat slow in coming, I decided to attempt to exploit this vulnerability. This would have to be another scriptless vulnerability.

article thumbnail

Google Workspace Security Insurance for SMB

Spinone

Cybersecurity is often overlooked by small business, but over 60% of cyber attacks are targeted at small to medium-sized businesses. Small businesses are attractive to hackers because they usually do not have the sophisticated security systems that are in use by larger organizations. They are also likely to have more digital assets than individual users […] The post Google Workspace Security Insurance for SMB first appeared on SpinOne.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Learn cybersecurity basics with these essential YouTube videos

Tech Republic Security

A hand-picked list of must-watch cybersecurity videos to help you learn the fundamentals of encryption, how hackers penetrate systems, and strong cyber-defense tactics for business.

article thumbnail

Growing Cyber Threats to the Energy and Industrial Sectors

NopSec

Remember Shamoon, the malware that disabled some 35,000 computers at one of the world’s largest oil companies in 2012? If you’ve read cybersecurity news lately, you’ve probably heard that it’s back. This time, Shamoon disrupted servers at several Saudi government agencies. When the malware hit Saudi Aramco four years ago, it propelled the company into a technological dark age, forcing the company to rely on typewriters and faxes while it recovered.

More Trending

article thumbnail

G Suite Security Insurance for SMB

Spinone

Cybersecurity is often overlooked by small business, but over 60% of cyber attacks are targeted at small to medium-sized businesses. Small businesses are attractive to hackers because they usually do not have the sophisticated security systems that are in use by larger organizations. They are also likely to have more digital assets than individual users and so the potential for profiting or gaining useful information is much higher.

article thumbnail

Gallery: The 10 biggest business hacks of 2016

Tech Republic Security

This year thousands of cyber-attacks cost companies millions in damages and exposed billions of sensitive consumer and corporate records. These are the 10 biggest business hacks of 2016.

Hacking 167
article thumbnail

HHS Issues Warning About Phishing Campaign Disguised As Official Communication

Privacy and Cybersecurity Law

As part of its efforts to assess compliance with the HIPAA Privacy, Security and Breach Notification Rules, the US Department […].

article thumbnail

Worried about identity theft? Then you should avoid these password pitfalls

Tech Republic Security

We're constantly reminded of the risks that come with bad passwords, yet many people persist in using obvious and easy-to-crack names, words, and patterns. Want to know if you're at risk?

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The smart city security nightmare: How cities can stay awake

Tech Republic Security

One of the elephants in the room at the 2016 Smart Cities Summit in Boston was cybersecurity. It threatens to derail the most optimistic plans for making cities more efficient and more responsive.

article thumbnail

Snowden blasts US justice department, says Petraeus leaks 'far more highly classified' than his own

Tech Republic Security

In a recent interview with Yahoo's Katie Couric, former NSA contractor Edward Snowden spoke about how he believes justice in the US is 'two-tiered.

165
165
article thumbnail

NIST's Cybersecurity Framework offers small businesses a vital information security toolset

Tech Republic Security

Small businesses run lean, and bad guys know that means security may be less than adequate. NIST researchers share ways that small businesses can protect their information.

article thumbnail

BlackBerry Secure: IoT security goes mobile with new enterprise platform

Tech Republic Security

BlackBerry recently unveiled BlackBerry Secure, a new security platform that hopes to help organizations more effectively manage smartphones and connected devices.

Mobile 149
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to gain encrypted email on the Chromebook

Tech Republic Security

If you've been waiting for encrypted email to arrive on Chrome OS, thanks to Android apps, it is now ready for prime time. Jack Wallen shows to make this so.

article thumbnail

Video: The top 5 reasons you should care about privacy

Tech Republic Security

Here are five things that might convince you to care about your personal data, even if you think you don't.

165
165
article thumbnail

How to fix Apache 2 not executing PHP files

Tech Republic Security

If your Apache 2 web server is failing to execute PHP files, learn how to quickly remedy this issue.

167
167
article thumbnail

Android Security Bulletin December 2016: What you need to know

Tech Republic Security

Although there are no new Critical vulnerabilities in the Android December 2016 Security Bulletin, there are plenty of flaws to be found this month. Get the highlights.

119
119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?