Sat.Aug 12, 2017 - Fri.Aug 18, 2017

article thumbnail

Women in cybersecurity: IBM wants to send you to a hacker conference for free

Tech Republic Security

A new IBM scholarship will cover 100% of the entry fees for any woman interested in attending EC-Council's Hacker Halted conference. Here's how to take advantage of the offer.

article thumbnail

Understanding the Mirai Botnet

Elie

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims.

DDOS 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Detect and Prevent Data Exfiltration Webinar with Infoblox

Andrew Hay

Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview. Data is the new currency in the modern digital enterprise and protecting data is a strategic imperative for every organization.

DNS 40
article thumbnail

DevOps Risk Management: Vulnerability Risk Management as DevOps Practice

NopSec

Silos exist in all levels and all types of organizations. Different teams naturally have different priorities, methodologies, and more, though it can be argued that more collaboration can improve the efficiency and effectiveness of the company as a whole. This can be seen especially within IT Teams as well, particularly the development and operations teams.

Risk 40
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How to use Secure Copy for file transfer

Tech Republic Security

FTP was the popular protocol for file transfer but short of using FTPS, it doesn't provide the security required these days. Here's how to use Secure Copy (SCP) for file transfer.

163
163
article thumbnail

Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

iOS users beware: A hacker has just published a decryption key for the Apple Secure Enclave, which is responsible for processing Touch ID transactions.

Mobile 160

LifeWorks

More Trending

article thumbnail

If you're really concerned about browser security, Incognito isn't enough

Tech Republic Security

If you assume your browsing is private and secure, think again. Jack Wallen offers up what he believes is your best bet to safeguard your browsing sessions and data.

141
141
article thumbnail

Hundreds of IoT smart locks bricked by bad update, leaving customers stranded

Tech Republic Security

A botched wireless update for certain LockState locks has left them unable to be locked or unlocked without the physical backup key and highlighting the dangers associated with IoT.

IoT 141
article thumbnail

Raspberry Pi owners: Update now to block this Wi-Fi hack

Tech Republic Security

The update from the old Debian Jessie-based version of Raspbian includes various security fixes, including a patch for the Broadpwn Wi-Fi vulnerability.

Hacking 141
article thumbnail

Top 5: Things to know about password managers

Tech Republic Security

You've probably heard that password managers are the way to keep track of those long, complex passwords you should be using. Here's a quick explanation of how they work, and how to use them.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Stuxnet: The smart person's guide

Tech Republic Security

Stuxnet was one of the most advanced malware attacks in history. It might be long over, but there are important things for cybersecurity pros to learn from its outbreak that could affect everyone.

Malware 118
article thumbnail

Video: Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

The hack exposes firmware code, and could be a major blow to iOS security, a key component of Apple's hardware strategy.

Firmware 115
article thumbnail

Microsoft cloud cybersecurity attacks up 300% in last year, report says

Tech Republic Security

In volume 22 of Microsoft's Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users.

article thumbnail

Microsoft Office users beware: New malware comes through PowerPoint email attachment

Tech Republic Security

Trend Micro research has identified a new malware threat that presents itself in the form of a malicious PPSX file attachment. Here's what professionals should look out for.

Malware 106
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How Australia's backdoor proposal could threaten security for the rest of the world

Tech Republic Security

Australia's Prime Minister recently suggested a proposal that would allow access to information protected by encryption. Access Now's US Policy Manager Amie Stepanovich tells why that's a bad idea.

article thumbnail

'Indefensible' hack could leave modern cars vulnerable to critical cybersecurity attack

Tech Republic Security

The attack, which can disable airbags and other safety systems, affects the CAN standard for connected cars, affecting a large number of vendors and models.

Hacking 99
article thumbnail

Never used a password manager? Here's how to get started

Tech Republic Security

You've probably heard you're supposed to use long, complex passwords and use a password manager to keep track of them. But how to password managers work? Here's a quick explanation.

article thumbnail

Warning: These 8 Google Chrome extensions have been hijacked by a hacker

Tech Republic Security

Proofpoint research has found that certain Chrome extensions have been taken over in order to spread malicious ads and steal money from users.

96
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Exploit leaks led to 5M cybersecurity attacks in Q2, report says

Tech Republic Security

Malicious attacks rose in Q2, due in large part to an increase in exploit packages in-the-wild, according to a Kaspersky Lab report.

article thumbnail

Android Security Bulletin August 2017: What you need to know

Tech Republic Security

The Android Security bulletin has undergone some changes, but it doesn't mean you can't find out what plagues the platform. Here are the highlights.

92
article thumbnail

Cybersecurity IT pros vs. policy wonks: How to bridge the communication gap

Tech Republic Security

IT pros and policymakers focusing on cybersecurity often don't speak the same language and seem to be at odds with each other. Discover how these cybersecurity experts can find common ground.

article thumbnail

US Sec. Mattis pushes military AI, experts warn of hijacked 'killer robots'

Tech Republic Security

AI has the potential to revolutionize warfare, but its growth in the private sector far outpaces that of the government, according to a recent Harvard report.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Serious about online privacy? Try these 2 browsers

Tech Republic Security

Browsing in private or incognito mode isn't enough to keep all your data safe. For better security, try the Tor and Epic browsers.

90
article thumbnail

New Faketoken Android malware records calls, intercepts texts, and steals credit card info

Tech Republic Security

A new version of Faketoken was identified by Kaspersky and poses a huge threat to anyone who stores bank card information for in-app purchases.

Banking 84
article thumbnail

How to make sure your apps are safe with Google Play Protect

Tech Republic Security

Google has started rolling out Google Play Protect to Android devices. Jack Wallen explains how this new feature detects malicious apps, and points out its biggest flaw.

84
article thumbnail

Video: Follow the cybercrime money trail

Tech Republic Security

As cyberwar rages around the globe, Neil Walsh, Chief of the United Nations Office on Drugs & Crime Global Cybercrime Programme, explains how law enforcement agencies track digital criminals.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Prevention is a key defense, says chief of UN Global Programme on Cybercrime

Tech Republic Security

Chief of the United Nations Office on Drugs and Crime Global Programme on Cybercrime Neil Walsh details how to defend against cybercrime.