iCloud Keychain encryption bug exposes iOS passwords, credit card numbers
Tech Republic Security
JULY 24, 2017
A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.
Tech Republic Security
JULY 24, 2017
A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.
Elie
JULY 26, 2017
Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Kali Linux
JULY 25, 2017
VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even
NopSec
JULY 25, 2017
What’s the quickest way to a hacker’s heart? Make sure your business email password is “Password123.” Or perhaps “Summer2017” if you want to play coy. You do that and you fit into their perfect profile… of the perfect data breach victim. In all seriousness, this blog post has the following objectives: Show you how hackers prey on the presence of weak or default passwords Learn the differences between password cracking and guessing, and the tools hacker use to get this done Understand the importa
Speaker: Erroll Amacker
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
Tech Republic Security
JULY 24, 2017
Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.
Elie
JULY 25, 2017
In February 2017, we announced the first SHA-1 collision. This collision combined with a clever use of the PDF format allows attackers to forge PDF pairs that have identical SHA-1 hashes and yet display different content. This attack is the result of over two years of intense research. It took 6500 CPU years and 110 GPU years of computations which is still 100,000 times faster than a brute-force attack.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
JULY 24, 2017
Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.
Tech Republic Security
JULY 26, 2017
New research from Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering tracked bitcoin sales, discovering how much money hackers extorted through malicious attacks.
Tech Republic Security
JULY 28, 2017
A new report from Malwarebytes contains a trove of data on SMBs and ransomware, and the numbers reveal lots of downtime and a lack of best practices.
Tech Republic Security
JULY 24, 2017
Despite Windows XP being no longer patched against hackers, XP is still being used on 11% of laptops and desktops, compared to 13% running Windows 10.
Advertisement
Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.
Tech Republic Security
JULY 26, 2017
Keep your online data safe while you're on the go by getting a reliable VPN.
Tech Republic Security
JULY 27, 2017
The Lipizzan spyware family, which can record calls and screenshots, was recently discovered and blocked by Google Security researchers.
Tech Republic Security
JULY 28, 2017
Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that's helping countries prepare to defend themselves.
Tech Republic Security
JULY 26, 2017
Infecting machines through a phishing campaign, new macOS malware called OS X / Dok uses stolen developer credentials to bypass Gatekeeper and hooks into macOS preventing removal.
Advertisement
The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.
Tech Republic Security
JULY 25, 2017
To fill the cyber-skills job gap companies are investing heavily in talent with the right experience. TechRepublic's Alison DeNisco shares the top three cybersecurity jobs in demand by enterprise companies right now.
Tech Republic Security
JULY 27, 2017
"The growth of IoT is staggering," says Lastwall co-founder and CEO Karl Holmqvist. Designing cybersecurity best practices in your product at the beginning could protect your company from the next big attack.
Tech Republic Security
JULY 26, 2017
A report from Accenture has examined key threats that have emerged in the first half of 2017. Here's how businesses can stay safe.
Tech Republic Security
JULY 25, 2017
Lastwall co-founder and CEO Karl Holmqvist explains how robust information design can prevent and deter most cyber-attacks.
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Tech Republic Security
JULY 26, 2017
A new poll of IT professionals reveals that 86% of companies remain unprepared for ransomware attacks, and even more have no idea how to recover from cyber-attacks.
Tech Republic Security
JULY 24, 2017
Paul Rosen, former Chief of Staff at Department of Homeland Security and partner at Crowell & Moring, details the lessons companies and regulators should learn from the government's data breaches.
Tech Republic Security
JULY 28, 2017
Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.
Tech Republic Security
JULY 26, 2017
Encryption can prevent cyberattacks, but seven out of 12 tech leaders said their companies do not use this process for emails.
Speaker: Sierre Lindgren
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Tech Republic Security
JULY 27, 2017
Build a foundation in security hacking and land yourself a new career.
Tech Republic Security
JULY 28, 2017
Building cyberdefense measures in at the ground level of all products, says Lastwall co-founder and CEO Karl Holmqvist, will help prevent future attacks and save money.
Tech Republic Security
JULY 27, 2017
Encryption backdoors can help law enforcement catch criminals. But they can also make illegal endeavors easier for those carrying them out.
Tech Republic Security
JULY 25, 2017
Stay on top of this crucial discipline and improve your employment prospects.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
JULY 25, 2017
A new study polled IT professionals about their response to WannaCry. The numbers aren't surprising, and that's not necessarily a good thing.
Tech Republic Security
JULY 26, 2017
Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.
Tech Republic Security
JULY 27, 2017
Mandating backdoors to encrypted services so law enforcement can use them under warrants has been a hot topic recently. But a backdoor for the good guys could be backdoor for the bad guys too.
Tech Republic Security
JULY 27, 2017
Any organization can fall victim to cybercrime. Learn how the DHS deals with threats and how to apply their response plan to your business.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Let's personalize your content