Sat.Jul 22, 2017 - Fri.Jul 28, 2017

article thumbnail

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers

Tech Republic Security

A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VMware Fusion Kali USB Boot

Kali Linux

VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even

article thumbnail

Password Cracking: Top Tools Hackers Use to Crack Passwords

NopSec

What’s the quickest way to a hacker’s heart? Make sure your business email password is “Password123.” Or perhaps “Summer2017” if you want to play coy. You do that and you fit into their perfect profile… of the perfect data breach victim. In all seriousness, this blog post has the following objectives: Show you how hackers prey on the presence of weak or default passwords Learn the differences between password cracking and guessing, and the tools hacker use to get this done Understand the importa

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

10 books on cybersecurity that all IT leaders should read

Tech Republic Security

Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

article thumbnail

How we created the first SHA-1 collision and what it means for hash security

Elie

In February 2017, we announced the first SHA-1 collision. This collision combined with a clever use of the PDF format allows attackers to forge PDF pairs that have identical SHA-1 hashes and yet display different content. This attack is the result of over two years of intense research. It took 6500 CPU years and 110 GPU years of computations which is still 100,000 times faster than a brute-force attack.

LifeWorks

More Trending

article thumbnail

New Microsoft cloud service uses AI to find bugs in your code

Tech Republic Security

Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.

article thumbnail

Ransomware victims shelled out $25 million over the last two years, according to Google report

Tech Republic Security

New research from Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering tracked bitcoin sales, discovering how much money hackers extorted through malicious attacks.

article thumbnail

Report: 22% of SMBs hit by ransomware cease operation

Tech Republic Security

A new report from Malwarebytes contains a trove of data on SMBs and ransomware, and the numbers reveal lots of downtime and a lack of best practices.

article thumbnail

Windows 10 only slightly more popular than Windows XP among firms

Tech Republic Security

Despite Windows XP being no longer patched against hackers, XP is still being used on 11% of laptops and desktops, compared to 13% running Windows 10.

129
129
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Ensure protection against online thieves with this award-winning VPN

Tech Republic Security

Keep your online data safe while you're on the go by getting a reliable VPN.

VPN 122
article thumbnail

New Android spyware can record your voice, take photos with your camera, and steal app data

Tech Republic Security

The Lipizzan spyware family, which can record calls and screenshots, was recently discovered and blocked by Google Security researchers.

Spyware 114
article thumbnail

Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse

Tech Republic Security

Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that's helping countries prepare to defend themselves.

article thumbnail

Video: Think macOS is impervious to malware? Think again!

Tech Republic Security

Infecting machines through a phishing campaign, new macOS malware called OS X / Dok uses stolen developer credentials to bypass Gatekeeper and hooks into macOS preventing removal.

Malware 113
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Video: How to jumpstart your cybersecurity career

Tech Republic Security

To fill the cyber-skills job gap companies are investing heavily in talent with the right experience. TechRepublic's Alison DeNisco shares the top three cybersecurity jobs in demand by enterprise companies right now.

article thumbnail

Video: Good security design will protect your company from cyber-attacks

Tech Republic Security

"The growth of IoT is staggering," says Lastwall co-founder and CEO Karl Holmqvist. Designing cybersecurity best practices in your product at the beginning could protect your company from the next big attack.

article thumbnail

Report: The top 5 cybersecurity threats of 2017

Tech Republic Security

A report from Accenture has examined key threats that have emerged in the first half of 2017. Here's how businesses can stay safe.

article thumbnail

Video: This one fact about cybersecurity could save your company money

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how robust information design can prevent and deter most cyber-attacks.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Video: Why ransomware attacks like WannaCry are so costly

Tech Republic Security

A new poll of IT professionals reveals that 86% of companies remain unprepared for ransomware attacks, and even more have no idea how to recover from cyber-attacks.

article thumbnail

Video: What happens at the government when a cybersecurity threat is identified?

Tech Republic Security

Paul Rosen, former Chief of Staff at Department of Homeland Security and partner at Crowell & Moring, details the lessons companies and regulators should learn from the government's data breaches.

article thumbnail

Two-factor authentication utilizes data intelligently to protect users

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

article thumbnail

CIO Jury: Nearly 60% of companies don't encrypt corporate emails

Tech Republic Security

Encryption can prevent cyberattacks, but seven out of 12 tech leaders said their companies do not use this process for emails.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

White hat hackers are in demand - learn how to become one

Tech Republic Security

Build a foundation in security hacking and land yourself a new career.

Hacking 98
article thumbnail

How your company can avoid one of the biggest problems in cybersecurity

Tech Republic Security

Building cyberdefense measures in at the ground level of all products, says Lastwall co-founder and CEO Karl Holmqvist, will help prevent future attacks and save money.

article thumbnail

Top 5: Risks of encryption backdoors

Tech Republic Security

Encryption backdoors can help law enforcement catch criminals. But they can also make illegal endeavors easier for those carrying them out.

article thumbnail

Learn the newest ethical hacking techniques for 2017

Tech Republic Security

Stay on top of this crucial discipline and improve your employment prospects.

Hacking 87
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Report: The IT response to WannaCry

Tech Republic Security

A new study polled IT professionals about their response to WannaCry. The numbers aren't surprising, and that's not necessarily a good thing.

84
article thumbnail

Video: Can big data and machine learning kill two-factor authentication?

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

article thumbnail

5 reasons encryption backdoors are a bad idea

Tech Republic Security

Mandating backdoors to encrypted services so law enforcement can use them under warrants has been a hot topic recently. But a backdoor for the good guys could be backdoor for the bad guys too.

article thumbnail

How the DHS responds to cyberthreats, and what businesses can learn

Tech Republic Security

Any organization can fall victim to cybercrime. Learn how the DHS deals with threats and how to apply their response plan to your business.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!