Sat.Aug 12, 2017 - Fri.Aug 18, 2017

article thumbnail

Women in cybersecurity: IBM wants to send you to a hacker conference for free

Tech Republic Security

A new IBM scholarship will cover 100% of the entry fees for any woman interested in attending EC-Council's Hacker Halted conference. Here's how to take advantage of the offer.

article thumbnail

Understanding the Mirai Botnet

Elie

The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims.

DDOS 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Detect and Prevent Data Exfiltration Webinar with Infoblox

Andrew Hay

Please join SANS Institute Instructor and LEO Cyber Security Co-Founder & CTO Andrew Hay and Infoblox Security Product Marketing’s Sam Kumarsamy on Thursday, August 17th, 2017 at 1:00 PM EDT (17:00:00 UTC) as they present a SANS Institute webinar entitled Detect & Prevent Data Exfiltration: A Unique Approach. Overview. Data is the new currency in the modern digital enterprise and protecting data is a strategic imperative for every organization.

DNS 40
article thumbnail

DevOps Risk Management: Vulnerability Risk Management as DevOps Practice

NopSec

Silos exist in all levels and all types of organizations. Different teams naturally have different priorities, methodologies, and more, though it can be argued that more collaboration can improve the efficiency and effectiveness of the company as a whole. This can be seen especially within IT Teams as well, particularly the development and operations teams.

Risk 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

iOS users beware: A hacker has just published a decryption key for the Apple Secure Enclave, which is responsible for processing Touch ID transactions.

Mobile 153
article thumbnail

How to use Secure Copy for file transfer

Tech Republic Security

FTP was the popular protocol for file transfer but short of using FTPS, it doesn't provide the security required these days. Here's how to use Secure Copy (SCP) for file transfer.

130
130

More Trending

article thumbnail

Top 5: Things to know about password managers

Tech Republic Security

You've probably heard that password managers are the way to keep track of those long, complex passwords you should be using. Here's a quick explanation of how they work, and how to use them.

article thumbnail

Hundreds of IoT smart locks bricked by bad update, leaving customers stranded

Tech Republic Security

A botched wireless update for certain LockState locks has left them unable to be locked or unlocked without the physical backup key and highlighting the dangers associated with IoT.

IoT 108
article thumbnail

If you're really concerned about browser security, Incognito isn't enough

Tech Republic Security

If you assume your browsing is private and secure, think again. Jack Wallen offers up what he believes is your best bet to safeguard your browsing sessions and data.

109
109
article thumbnail

Microsoft Office users beware: New malware comes through PowerPoint email attachment

Tech Republic Security

Trend Micro research has identified a new malware threat that presents itself in the form of a malicious PPSX file attachment. Here's what professionals should look out for.

Malware 99
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How Australia's backdoor proposal could threaten security for the rest of the world

Tech Republic Security

Australia's Prime Minister recently suggested a proposal that would allow access to information protected by encryption. Access Now's US Policy Manager Amie Stepanovich tells why that's a bad idea.

article thumbnail

Raspberry Pi owners: Update now to block this Wi-Fi hack

Tech Republic Security

The update from the old Debian Jessie-based version of Raspbian includes various security fixes, including a patch for the Broadpwn Wi-Fi vulnerability.

Hacking 97
article thumbnail

Microsoft cloud cybersecurity attacks up 300% in last year, report says

Tech Republic Security

In volume 22 of Microsoft's Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users.

article thumbnail

'Indefensible' hack could leave modern cars vulnerable to critical cybersecurity attack

Tech Republic Security

The attack, which can disable airbags and other safety systems, affects the CAN standard for connected cars, affecting a large number of vendors and models.

Hacking 86
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cybersecurity IT pros vs. policy wonks: How to bridge the communication gap

Tech Republic Security

IT pros and policymakers focusing on cybersecurity often don't speak the same language and seem to be at odds with each other. Discover how these cybersecurity experts can find common ground.

article thumbnail

Stuxnet: The smart person's guide

Tech Republic Security

Stuxnet was one of the most advanced malware attacks in history. It might be long over, but there are important things for cybersecurity pros to learn from its outbreak that could affect everyone.

Malware 73
article thumbnail

Warning: These 8 Google Chrome extensions have been hijacked by a hacker

Tech Republic Security

Proofpoint research has found that certain Chrome extensions have been taken over in order to spread malicious ads and steal money from users.

82
article thumbnail

US Sec. Mattis pushes military AI, experts warn of hijacked 'killer robots'

Tech Republic Security

AI has the potential to revolutionize warfare, but its growth in the private sector far outpaces that of the government, according to a recent Harvard report.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Android Security Bulletin August 2017: What you need to know

Tech Republic Security

The Android Security bulletin has undergone some changes, but it doesn't mean you can't find out what plagues the platform. Here are the highlights.

77
article thumbnail

Never used a password manager? Here's how to get started

Tech Republic Security

You've probably heard you're supposed to use long, complex passwords and use a password manager to keep track of them. But how to password managers work? Here's a quick explanation.

article thumbnail

How to make sure your apps are safe with Google Play Protect

Tech Republic Security

Google has started rolling out Google Play Protect to Android devices. Jack Wallen explains how this new feature detects malicious apps, and points out its biggest flaw.

70
article thumbnail

Exploit leaks led to 5M cybersecurity attacks in Q2, report says

Tech Republic Security

Malicious attacks rose in Q2, due in large part to an increase in exploit packages in-the-wild, according to a Kaspersky Lab report.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Video: Follow the cybercrime money trail

Tech Republic Security

As cyberwar rages around the globe, Neil Walsh, Chief of the United Nations Office on Drugs & Crime Global Cybercrime Programme, explains how law enforcement agencies track digital criminals.

article thumbnail

New Faketoken Android malware records calls, intercepts texts, and steals credit card info

Tech Republic Security

A new version of Faketoken was identified by Kaspersky and poses a huge threat to anyone who stores bank card information for in-app purchases.

Banking 70
article thumbnail

Prevention is a key defense, says chief of UN Global Programme on Cybercrime

Tech Republic Security

Chief of the United Nations Office on Drugs and Crime Global Programme on Cybercrime Neil Walsh details how to defend against cybercrime.

article thumbnail

Video: Hacker claims to have decrypted Apple's Secure Enclave, destroying key piece of iOS mobile security

Tech Republic Security

The hack exposes firmware code, and could be a major blow to iOS security, a key component of Apple's hardware strategy.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Serious about online privacy? Try these 2 browsers

Tech Republic Security

Browsing in private or incognito mode isn't enough to keep all your data safe. For better security, try the Tor and Epic browsers.

64