Sat.Sep 24, 2016 - Fri.Sep 30, 2016

article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Security

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

Internet 161
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apps vs. mobile websites: Which option offers users more privacy?

Tech Republic Security

Is it better to use a mobile app or the equivalent mobile website when it comes to privacy? Researchers have an answer, and offer a privacy resource that rates 50 free online services.

Mobile 156
article thumbnail

Beware: iOS 10 security flaw makes cracking encrypted backups 2,500 times easier

Tech Republic Security

Russian security firm Elcomsoft discovered the flaw, which makes brute force password cracking far easier than in iOS 9. All iPhone and iPad users need to be aware of what's at stake.

Backups 149
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

A Pokemon Go guide infected thousands of phones

Tech Republic Security

"There's no surprise that an app as popular as Pokemon Go has spawned associated malware," said Tim Erlin, senior director of IT security and risk strategy for Tripwire.

Malware 146
article thumbnail

Security: It might not be the outside world that's the largest threat to businesses

Tech Republic Security

A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

141
141

More Trending

article thumbnail

Understanding Android's balance between openness and security

Tech Republic Security

At the 2016 Structure Security conference, Google's Adrian Ludwig talked about the balance between keeping Android as open as possible, while also keeping it secure.

140
140
article thumbnail

What business leaders need to know about the state of cybersecurity

Tech Republic Security

At the 2016 Structure Security conference, Rally Ventures' Art Coviello gave an overview of the threat landscape and provided best practices for security professionals and developers.

article thumbnail

Enterprise IoT deployment creates a target-rich environment for criminals

Tech Republic Security

Every company involved in IoT knows the systems are insecure--including Microsoft. It is working on platform solutions, but developers have to make a commitment to proactive security.

IoT 127
article thumbnail

Poll: Should Edward Snowden be pardoned?

Tech Republic Security

Is the NSA hacker a whistleblower or traitor? Hero or villain? Take our poll and tell us whether you think Edward Snowden deserves a break.

139
139
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

5 things we learned about the state of cybersecurity from Structure Security 2016

Tech Republic Security

The first annual Structure Security conference took place in San Francisco in September. Here are the top takeaways.

article thumbnail

Why operational technology must be addressed to secure industrial IoT

Tech Republic Security

At the 2016 Structure Security conference, GE's Tom Le explained how a combination of IT and OT are core to securing industrial IoT.

IoT 140
article thumbnail

Help wanted: How automation can help with the security skills gap

Tech Republic Security

Many tech jobs are going unfilled, and that number is growing in security. Jay Leek, the CISO of Blackstone, explained how CISOs can prepare for the lack of talent in the future.

CISO 118
article thumbnail

How to enable two-step authentication in Dropbox

Tech Republic Security

Concerned about the security of your Dropbox account? For an added layer of protection, follow this process of setting up two-step authentication in Dropbox.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Cyberinsurance experts disagree on coverage necessity

Tech Republic Security

Cyberinsurance is an easy pitch. RAND says you might not want to swing.

117
117