Sat.Jun 10, 2017 - Fri.Jun 16, 2017

article thumbnail

Fileless malware: An undetectable threat

Tech Republic Security

Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it.

Malware 146
article thumbnail

Understanding the prevalence of web traffic interception

Elie

This post summarizes how prevalent encrypted web traffic interception is and how it negatively affects online security according to a study we published at NDSS 2017.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Qubes OS 4.2 officials released: The best Linux distributions for privacy and security

Penetration Testing

What is Qubes OS? Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft... The post Qubes OS 4.2 officials released: The best Linux distributions for privacy and security appeared first on Penetration Testing.

article thumbnail

Key Milestone Dates: NYDFS Cybersecurity Regulations

NopSec

If you’re in the financial industry (or working as a provider with such organizations), you most likely have already heard about the NY DFS Cybersecurity Regulations. The whole affair started late 2016, and was finally implemented on March 1, 2017. It’s the first regulation of its kind in the United States, and it’s set a precedent for regulations that has since surfaced in other states.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Swapping Linux for Windows in Munich too risky after WannaCry attacks, warn Greens

Tech Republic Security

Munich's Green Party says the recent WannaCry ransomware attacks on Windows machines worldwide highlight the danger of the city abandoning its Linux-based OS.

article thumbnail

Ransomware: The most important thing you can do not to be a victim

Tech Republic Security

If you're wondering what important steps you can take to avoid getting taken down by ransomware, Jack Wallen offers up one tip that will go a very long way.

More Trending

article thumbnail

IBM simplifies identity management in the cloud with new offering

Tech Republic Security

IBM's new Identity Connect is an Identity-as-a-Service (IDaaS) solution that aims to make it easier for business users to access their applications.

151
151
article thumbnail

Want a career in cybersecurity? Here are 10 jobs to explore

Tech Republic Security

There are currently 1 million open cybersecurity jobs worldwide. Here are 10 different career options to investigate in the field.

article thumbnail

Five traits employers should look for when hiring cyber security professionals

Tech Republic Security

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

151
151
article thumbnail

Microsoft used AI to combat global tech support scams

Tech Republic Security

As part of a federal crackdown on tech support scams, Microsoft's Digital Crimes Unit relied on artificial intelligence to help track and take down the criminals behind them.

Scams 126
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

New Windows XP patch: Microsoft issues extraordinary fix to protect PCs against next WannaCry

Tech Republic Security

To limit the number of machines at risk from self-replicating malware like WannaCry, Microsoft yesterday patched vulnerabilities on Windows XP and other unsupported operating systems.

Malware 124
article thumbnail

Microsoft will counter cyberattacks on Windows 10 with AI from Hexadite

Tech Republic Security

Criminals are winning the battle for data access way too often. Microsoft is adding AI and automation to its security platform by acquiring innovations from Hexadite.

124
124
article thumbnail

Former US security advisor: Cyberattacks damage society as much as physical infrastructure

Tech Republic Security

At the 2017 Global Cybersecurity Summit in Kiev, Ukraine, Tony Blinken, who was deputy secretary of state to Barack Obama, said the best defenses against cyberattacks are educated consumers and collaborative responses.

Education 120
article thumbnail

US indicts North Korea for host of cyberattacks, expects more to come

Tech Republic Security

A North Korean entity called Hidden Cobra was behind a series of cyberattacks in the US using sophisticated tools and targeting a diverse group of entities.

124
124
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Report: 19% of business passwords 'easily compromised'

Tech Republic Security

Nearly one in five enterprise users have passwords that are weak or shared, putting their business at risk for cyber attack, according to a new report from Preempt.

Passwords 121
article thumbnail

How to quickly give users sudo privileges in Linux

Tech Republic Security

If you have users that need certain admin privileges on your Linux machines, here's a walk-through of the process for granting full or specific rights.

127
127
article thumbnail

Video: Why employers should seek out "New Collar" workers to fill the cyber-skills job gap

Tech Republic Security

There's a massive workforce shortage in the tech and cybersecurity industry. IBM Security's David Jarvis explains the benefits of hiring employees with a broad range of experience, skills, and aptitudes.

article thumbnail

57% of executives trust AI security systems 'as much or more than' humans

Tech Republic Security

Adoption of artificial intelligence for security automation is reaching critical mass, according to a new Radware report, with 81% of executives now relying more heavily on AI solutions.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video: These are the platforms powering the $455B per year cybercrime industry

Tech Republic Security

Etay Maor Executive Security Advisor at IBM how the same 'trust mechanics' used on e-commerce sites - user reviews, comments, and product ratings - drive the sale of zero days exploits and malware on the Dark Web.

article thumbnail

GCS 2017 panel: Are we spending cybersecurity dollars in the right places?

Tech Republic Security

A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine, considers whether the billions of dollars being spent on cybersecurity technology and services have been effective, and where future spending should be directed.

article thumbnail

10 elements every production environment must have

Tech Republic Security

One company recently experienced disaster when an employee accidentally destroyed a production database. Here are 10 ways to prevent future scenarios like that.

99
article thumbnail

Why properly educating users is the best defense against future cyberattacks

Tech Republic Security

In an interview at the 2017 Global Cybersecurity Summit, former deputy secretary of state Tony Blinken explained how cyberattacks threaten our thoughts and beliefs, and how to mitigate this threat.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Video: Ransomware-as-a-service is causing mayhem

Tech Republic Security

Terbium Labs Director of Analysis Emily Wilson explains the Crystal version of the DiamondFox malware, a one-stop shop for keylogging and browser password stealing, DDoS attacks, and RAM scrapers.

DDOS 83
article thumbnail

Microsoft unveils fingerprint-scanning keyboard for privacy-conscious professionals

Tech Republic Security

Microsoft's $130 Modern Keyboard offers a fingerprint ID system and works with Windows, macOS, Android, and iOS.

107
107
article thumbnail

Facebook's secret weapon for fighting terrorists: Human experts and AI working together

Tech Republic Security

Facebook is employing artificial intelligence and counterterrorism experts to combat content around ISIS, Al Qaeda, and other extremist groups on its platform.

article thumbnail

Android Security Bulletin June 2017: What you need to know

Tech Republic Security

It was a bad month for Qualcomm components in the Android Security Bulletin. Get the highlights.

101
101
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

GCS 2017 panel: What does the future of IoT look like?

Tech Republic Security

An expert panel at the Global Cybersecurity Summit in Kiev, Ukraine, discusses what devices might be connected in the future, and what the implications might be for consumers, governments, and industries.

IoT 67
article thumbnail

Video: Is cybersecurity the next big automation frontier?

Tech Republic Security

More and more executives are saying AI-driven cybersecurity tools are trustworthy and reliable. Are we in the midst of an AI security revolution?

article thumbnail

Video: WannaCry is serious enough for Microsoft to patch unsupported Windows systems

Tech Republic Security

Unsupported versions of Windows practically never get patches, but the WannaCry attack is serious enough that they are.

66
article thumbnail

Video: North Korean hacking group has been hitting the US since 2009

Tech Republic Security

Hidden Cobra, a North Korean-backed hacking group, may also be responsible for WannaCry and the Sony Pictures hack.

Hacking 64
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.