Sat.Jul 22, 2017 - Fri.Jul 28, 2017

article thumbnail

10 books on cybersecurity that all IT leaders should read

Tech Republic Security

Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

VMware Fusion Kali USB Boot

Kali Linux

VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even

article thumbnail

Password Cracking: Top Tools Hackers Use to Crack Passwords

NopSec

What’s the quickest way to a hacker’s heart? Make sure your business email password is “Password123.” Or perhaps “Summer2017” if you want to play coy. You do that and you fit into their perfect profile… of the perfect data breach victim. In all seriousness, this blog post has the following objectives: Show you how hackers prey on the presence of weak or default passwords Learn the differences between password cracking and guessing, and the tools hacker use to get this done Understand the importa

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers

Tech Republic Security

A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.

article thumbnail

How we created the first SHA-1 collision and what it means for hash security

Elie

In February 2017, we announced the first SHA-1 collision. This collision combined with a clever use of the PDF format allows attackers to forge PDF pairs that have identical SHA-1 hashes and yet display different content. This attack is the result of over two years of intense research. It took 6500 CPU years and 110 GPU years of computations which is still 100,000 times faster than a brute-force attack.

More Trending

article thumbnail

Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse

Tech Republic Security

Cyberwar has evolved from the theoretical to the ominous. TechRepublic went inside one of the defenders vs. hackers war games that's helping countries prepare to defend themselves.

article thumbnail

Ransomware victims shelled out $25 million over the last two years, according to Google report

Tech Republic Security

New research from Google, Chainalysis, UC San Diego, and the NYU Tandon School of Engineering tracked bitcoin sales, discovering how much money hackers extorted through malicious attacks.

article thumbnail

New Microsoft cloud service uses AI to find bugs in your code

Tech Republic Security

Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.

article thumbnail

Windows 10 only slightly more popular than Windows XP among firms

Tech Republic Security

Despite Windows XP being no longer patched against hackers, XP is still being used on 11% of laptops and desktops, compared to 13% running Windows 10.

115
115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Report: 22% of SMBs hit by ransomware cease operation

Tech Republic Security

A new report from Malwarebytes contains a trove of data on SMBs and ransomware, and the numbers reveal lots of downtime and a lack of best practices.

article thumbnail

Video: Think macOS is impervious to malware? Think again!

Tech Republic Security

Infecting machines through a phishing campaign, new macOS malware called OS X / Dok uses stolen developer credentials to bypass Gatekeeper and hooks into macOS preventing removal.

Malware 96
article thumbnail

New Android spyware can record your voice, take photos with your camera, and steal app data

Tech Republic Security

The Lipizzan spyware family, which can record calls and screenshots, was recently discovered and blocked by Google Security researchers.

Spyware 111
article thumbnail

Report: The top 5 cybersecurity threats of 2017

Tech Republic Security

A report from Accenture has examined key threats that have emerged in the first half of 2017. Here's how businesses can stay safe.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Video: How to jumpstart your cybersecurity career

Tech Republic Security

To fill the cyber-skills job gap companies are investing heavily in talent with the right experience. TechRepublic's Alison DeNisco shares the top three cybersecurity jobs in demand by enterprise companies right now.

article thumbnail

Video: Good security design will protect your company from cyber-attacks

Tech Republic Security

"The growth of IoT is staggering," says Lastwall co-founder and CEO Karl Holmqvist. Designing cybersecurity best practices in your product at the beginning could protect your company from the next big attack.

article thumbnail

Video: What happens at the government when a cybersecurity threat is identified?

Tech Republic Security

Paul Rosen, former Chief of Staff at Department of Homeland Security and partner at Crowell & Moring, details the lessons companies and regulators should learn from the government's data breaches.

article thumbnail

CIO Jury: Nearly 60% of companies don't encrypt corporate emails

Tech Republic Security

Encryption can prevent cyberattacks, but seven out of 12 tech leaders said their companies do not use this process for emails.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

How your company can avoid one of the biggest problems in cybersecurity

Tech Republic Security

Building cyberdefense measures in at the ground level of all products, says Lastwall co-founder and CEO Karl Holmqvist, will help prevent future attacks and save money.

article thumbnail

Video: Why ransomware attacks like WannaCry are so costly

Tech Republic Security

A new poll of IT professionals reveals that 86% of companies remain unprepared for ransomware attacks, and even more have no idea how to recover from cyber-attacks.

article thumbnail

5 reasons encryption backdoors are a bad idea

Tech Republic Security

Mandating backdoors to encrypted services so law enforcement can use them under warrants has been a hot topic recently. But a backdoor for the good guys could be backdoor for the bad guys too.

article thumbnail

Two-factor authentication utilizes data intelligently to protect users

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Top 5: Risks of encryption backdoors

Tech Republic Security

Encryption backdoors can help law enforcement catch criminals. But they can also make illegal endeavors easier for those carrying them out.

article thumbnail

Emergency communications for civilians may improve soon, thanks to NICER

Tech Republic Security

German researchers are developing automated technology that would shift to a standardized emergency operating mode during disasters, affording the general public voice and data communications.

article thumbnail

Video: This one fact about cybersecurity could save your company money

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how robust information design can prevent and deter most cyber-attacks.

article thumbnail

Every iOS user should update to 10.3.3 now to avoid this Wi-Fi hack

Tech Republic Security

Called "Broadpwn," this Broadcom Wi-Fi chip flaw can result in a crashed iPhone, iPad, or iPod. If you don't update right away you're leaving yourself vulnerable.

Hacking 65
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Report: The IT response to WannaCry

Tech Republic Security

A new study polled IT professionals about their response to WannaCry. The numbers aren't surprising, and that's not necessarily a good thing.

71
article thumbnail

Ensure protection against online thieves with this award-winning VPN

Tech Republic Security

Keep your online data safe while you're on the go by getting a reliable VPN.

VPN 96
article thumbnail

How to add a second fingerprint for your OnePlus device

Tech Republic Security

You never know which finger you'll have free to use for your smartphone scanner. Jack Wallen shows you how to add additional fingerprints to the OnePlus line of smartphones.

60
article thumbnail

Video: Can big data and machine learning kill two-factor authentication?

Tech Republic Security

Lastwall co-founder and CEO Karl Holmqvist explains how artificial intelligence could could soon eliminate the need for password-based security.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.