Sat.Apr 29, 2017 - Fri.May 05, 2017

article thumbnail

How game theory and Nash equilibrium can help decide cybersecurity responses

Tech Republic Security

Should you respond to a cyber incident? The answer isn't always clear. But researchers have developed a model that should make the decision easier.

article thumbnail

Ode to the use-after-free: one vulnerable function, a thousand possibilities

Scary Beasts Security

Overview This post explores an old but wonderful vulnerability that enables us to really showcase the (oft underestimated) power of the use-after-free vulnerability class. We’re going to take a step back and consider the wider class of “use-after-invalidation”, of which use-after-free is one type of use of invalidated state. We will see one single area of vulnerable code that has it all: use-after-invalidation leading to out of bounds reads and writes; use-after-free leading to object aliasing;

Hacking 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Disambiguate “Zero-Day” Before Considering Countermeasures

Lenny Zeltser

“Zero-day” is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing scary threats against which we feel powerless. We need to define and disambiguate this term before attempting to determine whether we’ve accounted for the associated threats when designing security programs. Avoid Zero-Day Confusion.

Malware 68
article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

IBM admits it sent malware-infected USB sticks to customers

Tech Republic Security

In a recent support alert issued by IBM, the company noted that some USB drives that shipped with its Storwize systems contained malicious code.

Malware 153
article thumbnail

FBI Warns Cyber Criminals Are Targeting Unsecured FTP Servers In The Healthcare Industry

Privacy and Cybersecurity Law

On March 22, 2017, the FBI issued a Private Industry Notification, warning that criminal actors are actively targeting File Transfer Protocol […].

LifeWorks

More Trending

article thumbnail

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

Tech Republic Security

Artificial intelligence algorithms are involved in a cyber arms race. Who will win: Antimalware developers or malware developers?

article thumbnail

New Android malware found every 10 seconds, report says

Tech Republic Security

A report from security company G DATA said that 8,400 new Android malware samples are discovered every day, stemming from the fragmentation issues with the OS.

Malware 146
article thumbnail

Hundreds of popular Android apps have open ports, making them prime targets for hacking

Tech Republic Security

A recent study found 956 potential exploits in Android apps that could allow data extraction, malware installs, and remote device control. Some of the affected apps have tens of millions of installs.

Hacking 146
article thumbnail

The 2017 DDoS tsunami will cost companies millions

Tech Republic Security

2.5 quadrillion bits of data are created every day. A new study by cybersecurity firm Neustar shows how weaponized data results in more powerful and frequent attacks.

DDOS 144
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

On World Password Day, here are 4 tips to keep your online accounts secure

Tech Republic Security

May 4, 2017 is officially World Password Day. Here are some tips and tricks to help you improve your online security.

Passwords 138
article thumbnail

How to avoid the devious Google Docs phishing frenzy hitting Gmail users everywhere

Tech Republic Security

A recent phishing scam has hit Gmail users with a fraudulent Google Docs link. Here's what to look out for.

Phishing 138
article thumbnail

Identity theft is alive and well--and fraudsters keep getting richer

Tech Republic Security

Last year, cyber criminals netted 16 billion dollars in the US alone. Find out why fraudsters are so successful and what you can do to stay safe.

article thumbnail

Tech execs unsure about cyberinsurance, want storage flexibility, and wonder about AI

Tech Republic Security

IT leaders attending the Landmark Ventures CIO Summit commented on everything from the Internet of Things to cognitive machine intelligence to their childhood 8-bit computers.

Internet 122
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Top 5: Ways to create secure IoT devices

Tech Republic Security

The next big cyberattack may come from the millions of unsecured Internet of Things devices out there. Here are five best practices to make sure your company's products don't become a target.

IoT 122
article thumbnail

Facebook exploited emotions of young users to sell ads, leaked document says

Tech Republic Security

A leaked Facebook document describes how the company used algorithms to identify when users as young as 14 are feeling vulnerable, and target advertising to them.

article thumbnail

Top 5 IoT security best practices

Tech Republic Security

There are millions of IoT devices out there, and security practices can be pretty inconsistent. Here are five things your company needs to do to secure the IoT.

IoT 121
article thumbnail

Samsung Knox: The smart person's guide

Tech Republic Security

Samsung Knox is a way to keep business and personal data separate and secure on supported Samsung Android devices. This Samsung Knox guide covers why the platform matters, how to use it, and more.

113
113
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

How to work with remote filesystems using sshfs

Tech Republic Security

If you need to work with remote directories between two Linux machines, here's how to do so securely, with the help of sshfs.

113
113
article thumbnail

How to resolve SSL certificate warnings produced by the latest Chrome update

Tech Republic Security

The latest Chrome update adds a stringent security feature which can prompt certificate warnings when accessing internal sites. Learn the details and how to mitigate this prompt on Windows systems.

113
113
article thumbnail

Video: Hundreds of Android apps contain open, vulnerable ports

Tech Republic Security

Open ports are a nightmare for security, and there could be hundreds on your company's BYOD devices.

78
article thumbnail

New Mexico Becomes 48th State To Enact Data Breach Notification Law

Privacy and Cybersecurity Law

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South […].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.