Sat.Apr 22, 2017 - Fri.Apr 28, 2017

article thumbnail

Do you work in the financial sector? Time to step up your cybersecurity habits

Tech Republic Security

A report from IBM Security revealed a 937% increase in records stolen from the financial sector in 2016. Here's what you need to know and do to protect your sensitive data.

article thumbnail

Kali Linux 2017.1 Release

Kali Linux

Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release , which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packages , an updated kernel that provides more and better hardware support, as well as a slew of updated tools - but this release has a few more surprises up its sleeve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tennessee Adds New Encryption And Timing Requirements To Its Data Breach Notification Law

Privacy and Cybersecurity Law

On April 4, 2017, Tennessee Governor Bill Haslam signed into law an amendment to the state’s data breach notification law, making two […].

article thumbnail

The Shadow Brokers-Leaked Equation Group’s Hacking Tools: A Lab-Demo Analysis

NopSec

According to the The Register’s article , last week we started assisting to the widespread exploitation of The Shadow Brokers ’ leaked Windows exploits, compromising thousands of vulnerable hosts over the Internet. This widespread exploitation prompted me to release this blog post that I have been mulling for a while. As part of the Equation Group’s hacking tools stash, leaked last week by The Shadow Brokers group, this is the latest installment of several leaks featuring network devices vuln

Hacking 52
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why businesses have the wrong cybersecurity mindset, and how they can fix it

Tech Republic Security

The Evolution of Security Skills, a new report from CompTIA, is calling on IT security professionals to form a more proactive strategy and examine emerging threats.

article thumbnail

Kali Linux Repository HTTPS Support

Kali Linux

A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redirector has not. Now that we generate weekly images, secure access to the mirror redirector has become crucial.

More Trending

article thumbnail

Online shoppers are losing trust in e-commerce, study finds

Tech Republic Security

According to a global survey from the Centre for International Governance Innovation, almost half of all respondents say they don't trust online shopping.

article thumbnail

Report: Cyberespionage now most popular form of cybercrime in many industries

Tech Republic Security

According to Verizon's 2017 Data Breach Investigations Report, espionage-related attacks are growing in popularity, with malware and phishing still go-to tools for hackers as well.

article thumbnail

Win32 is malware? Webroot mistakenly labels Windows as cybersecurity threat

Tech Republic Security

Antivirus provider Webroot recently pushed an updated causing it to read Windows system files as malware and label Facebook a phishing site.

Malware 141
article thumbnail

How one company wants to replace tech show booth babes with STEAM students

Tech Republic Security

The new STEAM-Con Connection offers cybersecurity vendors an alternative to staffing trade show booths with models. Here's how it works.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

IoT, encryption, and AI lead top security trends for 2017

Tech Republic Security

A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.

article thumbnail

NSA to end warrantless collection of emails and texts about foreign targets

Tech Republic Security

The National Security Agency will stop collecting Americans' emails and texts to people from other countries, and/or those that mention someone who is currently under surveillance.

article thumbnail

AV-TEST reveals the best backup and data security software

Tech Republic Security

AV-TEST engineers don't think all data protection and backup software is quite ready for prime time. Find out which product received AV-TEST's Approved Backup & Data Security Software certificate.

Backups 118
article thumbnail

Easy ways to make your Android device more secure

Tech Republic Security

Android security doesn't have to be a challenge. Here are a few simple and quick ways to make ensure your device is secure.

141
141
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Video: How to protect your corporate data while traveling

Tech Republic Security

Open wifi networks can compromise your data, and international customs might lead to a cyber-breach. iJET CEO Bruce McIndoe explains the best ways to take technological precautions while traveling.

article thumbnail

5 ways to make sure users comply with patch releases

Tech Republic Security

Patching critical vulnerabilities requires both technological and human-oriented solutions. Learn some techniques for maximizing user compliance.

article thumbnail

Texas A&M research team suggests how to defend against collective attention threats

Tech Republic Security

See how cybercriminals craft collective attention threats--and how university researchers plan to get the word out before attacks start.

94
article thumbnail

Video: The top 3 cybersecurity trends to watch in 2017

Tech Republic Security

Forrester just released a list of the top cybersecurity trends for 2017. Here are the top three.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video: How Source Defense protects against third-party vulnerabilities

Tech Republic Security

Malvertising grew by 132% last year. Learn how persistent threat monitoring tools protect companies from cross-site scripting vulnerabilities.

73
article thumbnail

Video: The biggest threats to financial institutions

Tech Republic Security

Cyberattacks on financial institutions skyrocketed in 2016. So where are the threats coming from?

63