Sat.Dec 17, 2016 - Fri.Dec 23, 2016

article thumbnail

Here are the biggest IoT security threats facing the enterprise in 2017

Tech Republic Security

The coming year will bring a large-scale IoT security breach, with fleet management, retail, manufacturing, and government at the biggest risk, according to experts.

IoT 167
article thumbnail

Earthrise

Adam Shostack

Image credit: Bill Anders, Apollo 8 , launched this day, Dec 21, 1968.

130
130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Private Right of Action under CASL coming July 2017

Privacy and Cybersecurity Law

Canada’s Anti-Spam Law came into force on July 1, 2014. Since then, all eyes have been on the Canadian Radio-television and Telecommunications Commission […].

article thumbnail

Digital forensics: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about digital forensics, the science of recovering data from computers, networks, mobile phones, and IoT devices.

IoT 153
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Police can force you to give up your iPhone password, Florida court rules

Tech Republic Security

A Florida judge recently ruled that the Fifth Amendment did not protect an iPhone user from releasing his passcode to be used in a case. Here's what it could mean for the future of digital privacy.

Passwords 137
article thumbnail

How to improve the security and privacy of your iPhone: 5 steps

Tech Republic Security

Protecting the data on your smartphone is paramount. Here are five simple changes you can enact to make your iPhone more secure.

159
159

More Trending

article thumbnail

Report: Russian military unit linked to DNC hacks

Tech Republic Security

Security firm CrowdStrike found evidence that malware used in the DNC hack matched that used by Russia against Ukraine.

Hacking 143
article thumbnail

The end of passwords? Not in the near future

Tech Republic Security

The media has proclaimed the password is dead and that a new solution is a must. Jack Wallen explains why he doesn't think we're even close to ready for such a change.

Passwords 118
article thumbnail

Visualizing the Russian cyberattack

Tech Republic Security

Cybersecurity experts explain how the data breach happened, and Twitter chatter reveals what competing social media factions are saying about the election hack.

article thumbnail

Windows 10: The 10 biggest controversies and surprises in 2016

Tech Republic Security

From unwanted upgrades to snooping on users, the biggest storms that whipped up around Microsoft's flagship OS this year.

137
137
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The top 10 mobile risks of 2016

Tech Republic Security

2016 was a big year for mobile devices - in good and bad ways. Here are the biggest disasters we saw this year.

Mobile 141
article thumbnail

How to protect secure shell on CentOS 7 with Fail2ban

Tech Republic Security

If you use secure shell on your CentOS 7 servers, follow these steps to add Fail2ban to block malicious users from gaining access through sshd.

110
110
article thumbnail

Rogue One: The Best Star Wars Yet?

Adam Shostack

Someone once asked me why I like Star Wars more than Star Trek. I was a bit taken aback, and he assumed that since I use it so much, I obviously prefer it. The real reason I use Star Wars is not that it’s better, but that there’s a small canon, and I don’t have to interrupt the flow of a talk to explain the scene where Darth Vader is strangling someone.