Sat.Jul 02, 2016 - Fri.Jul 08, 2016

article thumbnail

Hillary Clinton's infamous email server: 6 things you need to know

Tech Republic Security

Hillary Clinton's use of a private email server when she served as US secretary of state has been a major issue for the 2016 presidential candidate. Here are the six most critical facts about it.

156
156
article thumbnail

NopSec Report Finds Organizations Use Inadequate Risk Evaluation Scoring System

NopSec

NopSec released a featured annual report, “2016 State of Vulnerability Risk Management.” The report reveals key security threats by industry, cross-industry remediation developments, malware-based vulnerabilities, and the rising correlation of social media and security threats. Conducted by the NopSec Labs research team, the report analyzes over a million unique vulnerabilities and more than 76,000 vulnerabilities contained in the National Vulnerability Database over a 20-year period.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Avoid Ransomware in Google Workspace?

Spinone

Let’s explore how to avoid ransomware in Google Workspace. Ransomware has been a consistent threat to your cloud security. It can corrupt your computer files and files you store with the cloud service providers. There are many ways to spread such malware. How G Suite Ransomware May Spread Emails are frequently used way. You receive […] The post How to Avoid Ransomware in Google Workspace?

article thumbnail

Facebook Messenger boosts privacy with end-to-end encryption, self-destructing messages

Tech Republic Security

In a recent privacy push, Facebook announced that it was rolling out the beta of a new feature called 'secret conversations,' bringing better encryption and ephemeral messaging.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

HummingBad malware infects 10 million Android devices, millions more at risk

Tech Republic Security

A new malware called HummingBad, associated with Chinese cyber criminals Yingmob, has infected millions of devices and brings in millions of dollars of fake ad revenue.

Malware 113
article thumbnail

Gmail password compromised? Here are 5 steps to help you secure your account and find the leaks

Tech Republic Security

If your Gmail account credentials ever become public, here are five steps you can take to secure your account and make sure only the right people have access to your account.

More Trending

article thumbnail

Linux Mint 18 improves security, but at a cost

Tech Republic Security

Linux Mint 18 brings version 3.0 of the Cinnamon desktop, and major architectural changes intended to harden the security of the popular distribution. But, some challenges remain.

article thumbnail

4 security best practices to learn from the FDIC's data breaches

Tech Republic Security

Don't wait until a breach occurs--fine-tune your company's security policy today to keep data safe from internal and external threats.

article thumbnail

How to migrate to HTTPS using App Transport Security when developing iOS apps

Tech Republic Security

January 1, 2017 is Apple's deadline for developers to adopt the secure network calls promoted by App Transport Security. But don't wait--start using ATS in iOS and macOS development today.

79
article thumbnail

How to handle security risks in Red Hat virtualization environments

Tech Republic Security

Virtualization environments are getting more complex and susceptible to security risks. Here are some risk mitigation strategies, outlined in a session at the annual Red Hat Summit.

Risk 73
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Darktrace bolsters machine learning-based security tools to automatically attack threats

Tech Republic Security

A UK cybersecurity startup called Darktrace recently raised $65 million in growth equity financing to continue its global growth and further deployments.

article thumbnail

Mobile banking: Is it worth the security risk?

Tech Republic Security

There are upsides and downsides to banking via text. Jack Wallen highlights the security-centric cost of text-based banking.

Banking 81
article thumbnail

Why forensics investigators must handle solid-state drives with care

Tech Republic Security

Don't assume that hard-disk forensics tools work the same on solid-state drives.

96
article thumbnail

How to manage Linux password expiry with the chage command

Tech Republic Security

When you need to enforce password changes for users on Linux machines, the chage command-line tool is a must-have.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to Avoid G Suite Ransomware?

Spinone

Let’s explore how to avoid Ransomware viruses, that are a new very serious threat to your cloud security that can corrupt your computer files and files you store with the cloud service providers. There are many ways to spread such viruses. How G Suite Ransomware May Spread Emails are frequently used way. You receive a message like “I Love You”, then click a link with a virus, and you are done.

article thumbnail

UnifiedVRM Roadmap SiteRep

NopSec

… and I am back!! Apologies for waiting so long to blogging. The past few months here at NopSec have been filled with great activities and developments. So I am back this month telling you more what’s brewing in the UnifiedVRM feature roadmap. In the past few months we have been very busy filling our Unified VRM SaaS solution’s feature chest with great features.

40