Sat.Jul 01, 2017 - Fri.Jul 07, 2017

article thumbnail

CopyCat malware infects 14M devices, shows 'unprecedented success rate'

Tech Republic Security

Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.

Malware 154
article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

VPN 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Penetration Testing Tools: Top 6 Testing Tools and Software

NopSec

Penetration Testers (aka ethical hackers) use a myriad of hacking tools depending on the nature and scope of the projects they’re working on. Every engagement is different. Are they testing external or internal networks? Perhaps web applications or configurations? Are they given credentials beforehand, including getting their own space in the client’s building?

article thumbnail

UN report: 50% of countries have no cybersecurity strategy in place

Tech Republic Security

Singapore and the US top the list of countries with the greatest commitment to cybersecurity. However, most other countries are lacking in their approach to cybercrime, hacking, and more.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Five more ways to minimize fileless malware infections

Tech Republic Security

Beyond disabling macros, restricting unnecessary scripting languages, and being diligent about patch management, there are many other ways to protect your systems against fileless malware.

Malware 135
article thumbnail

Massive cyberattack on US critical infrastructure will hit within 2 years, say 60% of security pros

Tech Republic Security

New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.

More Trending

article thumbnail

Online fraudsters find better pickings with phone and text scamming

Tech Republic Security

An Australian researcher has data to suggest cybercriminals are getting better results using phone calls and text messages for their scams than email. Find out why, and get tips for staying safe.

Scams 101
article thumbnail

Video: Ransomware is the new normal

Tech Republic Security

Emily Wilson, director of Analysis at cybersecurity firm Terbium Labs, explains why malware attacks like ransomware have become more prevalent and more potent, and what companies can do to stay secure.

article thumbnail

Video: Finding practical ways to communicate cybersecurity best practices

Tech Republic Security

Greg Michaelidis, Cybersecurity Fellow at the New America Foundation and former Obama Senior Advisor for Public Affairs, explains why America's cybersecurity posture is dangerous and how companies can protect users from cyberattacks.

article thumbnail

How to manually add ssh keys for key-authentication

Tech Republic Security

If you need to get ssh keys copied from client to server but ssh-copy-id isn't an option, you'll have to go the manual route. Here's how to do it.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Despite hype, ransomware accounted for only 1% of malicious programs in 2016, according to report

Tech Republic Security

A new report from AV-Test showed that ransomware attacks on Windows in 2016 were low. Still, attacks like WannaCry and NotPetya caused a significant amount of damage.

article thumbnail

New G Suite security tool makes it easier to protect sensitive data from third-party apps

Tech Republic Security

A new Google G Suite feature called OAuth apps whitelisting aims to improve an organization's visibility into how its data is accessed and used by third-party applications.

86