Sat.Apr 29, 2017 - Fri.May 05, 2017

article thumbnail

How game theory and Nash equilibrium can help decide cybersecurity responses

Tech Republic Security

Should you respond to a cyber incident? The answer isn't always clear. But researchers have developed a model that should make the decision easier.

article thumbnail

Disambiguate “Zero-Day” Before Considering Countermeasures

Lenny Zeltser

“Zero-day” is the all-powerful boogieman of the information security industry. Too many of us invoke it when discussing scary threats against which we feel powerless. We need to define and disambiguate this term before attempting to determine whether we’ve accounted for the associated threats when designing security programs. Avoid Zero-Day Confusion.

Malware 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ten simple steps for keeping your laptop secure

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Diving into the Issues: Observations from SOURCE and AtlSecCon

Andrew Hay

Last week I had the pleasure of presenting three times, at two conferences, in two different countries: SOURCE in Boston, MA and at the Atlantic Security Conference (AtlSecCon) in Halifax, NS, Canada. The first event of my week was SOURCE Boston. This year marked the tenth anniversary of SOURCE Conference and it continues to pride itself on being one of the only venues that brings business, technology and security professionals together under one roof to focus on real-world, practical security s

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

IBM admits it sent malware-infected USB sticks to customers

Tech Republic Security

In a recent support alert issued by IBM, the company noted that some USB drives that shipped with its Storwize systems contained malicious code.

Malware 143
article thumbnail

FBI Warns Cyber Criminals Are Targeting Unsecured FTP Servers In The Healthcare Industry

Privacy and Cybersecurity Law

On March 22, 2017, the FBI issued a Private Industry Notification, warning that criminal actors are actively targeting File Transfer Protocol […].

More Trending

article thumbnail

New Android malware found every 10 seconds, report says

Tech Republic Security

A report from security company G DATA said that 8,400 new Android malware samples are discovered every day, stemming from the fragmentation issues with the OS.

Malware 134
article thumbnail

Hundreds of popular Android apps have open ports, making them prime targets for hacking

Tech Republic Security

A recent study found 956 potential exploits in Android apps that could allow data extraction, malware installs, and remote device control. Some of the affected apps have tens of millions of installs.

Hacking 128
article thumbnail

Using AI-enhanced malware, researchers disrupt algorithms used in antimalware

Tech Republic Security

Artificial intelligence algorithms are involved in a cyber arms race. Who will win: Antimalware developers or malware developers?

article thumbnail

The 2017 DDoS tsunami will cost companies millions

Tech Republic Security

2.5 quadrillion bits of data are created every day. A new study by cybersecurity firm Neustar shows how weaponized data results in more powerful and frequent attacks.

DDOS 122
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Facebook exploited emotions of young users to sell ads, leaked document says

Tech Republic Security

A leaked Facebook document describes how the company used algorithms to identify when users as young as 14 are feeling vulnerable, and target advertising to them.

article thumbnail

Identity theft is alive and well--and fraudsters keep getting richer

Tech Republic Security

Last year, cyber criminals netted 16 billion dollars in the US alone. Find out why fraudsters are so successful and what you can do to stay safe.

article thumbnail

Top 5: Ways to create secure IoT devices

Tech Republic Security

The next big cyberattack may come from the millions of unsecured Internet of Things devices out there. Here are five best practices to make sure your company's products don't become a target.

IoT 108
article thumbnail

Samsung Knox: The smart person's guide

Tech Republic Security

Samsung Knox is a way to keep business and personal data separate and secure on supported Samsung Android devices. This Samsung Knox guide covers why the platform matters, how to use it, and more.

107
107
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Tech execs unsure about cyberinsurance, want storage flexibility, and wonder about AI

Tech Republic Security

IT leaders attending the Landmark Ventures CIO Summit commented on everything from the Internet of Things to cognitive machine intelligence to their childhood 8-bit computers.

Internet 106
article thumbnail

How to resolve SSL certificate warnings produced by the latest Chrome update

Tech Republic Security

The latest Chrome update adds a stringent security feature which can prompt certificate warnings when accessing internal sites. Learn the details and how to mitigate this prompt on Windows systems.

104
104
article thumbnail

On World Password Day, here are 4 tips to keep your online accounts secure

Tech Republic Security

May 4, 2017 is officially World Password Day. Here are some tips and tricks to help you improve your online security.

Passwords 126
article thumbnail

How to avoid the devious Google Docs phishing frenzy hitting Gmail users everywhere

Tech Republic Security

A recent phishing scam has hit Gmail users with a fraudulent Google Docs link. Here's what to look out for.

Phishing 122
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Top 5 IoT security best practices

Tech Republic Security

There are millions of IoT devices out there, and security practices can be pretty inconsistent. Here are five things your company needs to do to secure the IoT.

IoT 95
article thumbnail

How to work with remote filesystems using sshfs

Tech Republic Security

If you need to work with remote directories between two Linux machines, here's how to do so securely, with the help of sshfs.

99
article thumbnail

Video: Hundreds of Android apps contain open, vulnerable ports

Tech Republic Security

Open ports are a nightmare for security, and there could be hundreds on your company's BYOD devices.

62
article thumbnail

New Mexico Becomes 48th State To Enact Data Breach Notification Law

Privacy and Cybersecurity Law

On April 6, 2017, New Mexico became the 48th state to enact a data breach notification law, leaving Alabama and South […].

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.