Sat.Jan 07, 2017 - Fri.Jan 13, 2017

article thumbnail

49% of businesses fell victim to cyber ransom attacks in 2016

Tech Republic Security

Ransom is the top motivation behind cyber attacks, according to a report from Radware, and IT professionals are most concerned about data loss. Here's what you need to know.

article thumbnail

2017 Outlook: Remediation Trends

NopSec

Each year, NopSec conducts a survey of IT and cybersecurity professionals to glean a snapshot of the current state of vulnerability risk management and the outlook for VRM(Vulnerability Risk Management) in the coming year. This survey lets us take the pulse of security professionals across different types of businesses and at varying levels in their organizations, and provides some benchmarking figures for infosec teams who want to know how the maturity of their VRM programs compare.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google Drive Backup Software

Spinone

Today, many people use Google Drive to store personal and working documents. Google Drive Backup and Recovery software is the best solution for keeping your data safe. Google Drive Advantages All of your documents are always available, no matter where or when a great idea has visited you. Whether you are at work, home or on the go, you can write new or edit existing documents and share them with colleagues.

Backups 40
article thumbnail

Get ready for the rise of spymail, the hottest trend in email hacking

Tech Republic Security

A dramatic spike in malicious email code that monitors user behavior used in phishing attacks has cost business over $3 billion in recent years. Learn how to discover who's snooping on your email.

Hacking 147
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Massive ransomware attack takes out 27,000 MongoDB servers

Tech Republic Security

A slew of MongoDB databases were recently wiped, with attackers demanding Bitcoin payment in exchange for the data, as tracked by Norwegian developer Niall Merrigan and ethical hacker Victor Gevers.

article thumbnail

Interview with a hacker: Kapustkiy from New World Hackers

Tech Republic Security

New World Hackers claimed responsibility for the Dyn botnet attack. One of the group's database experts explains how he attacks networks, what happens to stolen data, and the mindset of a hacker.

137
137

More Trending

article thumbnail

5 data security and privacy tips for iOS

Tech Republic Security

Securing privacy and data on mobile devices is always a tricky proposition, but with the right combination of settings, apps, and care, iOS users can feel safer.

Mobile 129
article thumbnail

Hackers steal 900 GB of data from phone hacking company Cellebrite

Tech Republic Security

Hackers have taken records of customer information and technical resources from Cellebrite, an organization which sells hardware designed to extract data from secured smartphones.

Hacking 119
article thumbnail

Amazon Echo murder case raises IoT privacy questions for enterprise users

Tech Republic Security

Police in Arkansas want to access an alleged murderer's Amazon Echo recordings, raising new privacy issues around the Internet of Things.

IoT 136
article thumbnail

IBM Watson, FDA to use blockchain tech to build secure exchange for health data

Tech Republic Security

IBM Watson Health and the FDA recently signed a research initiative looking at ways to leverage the blockchain to safely share sensitive health data, starting with oncology records.

118
118
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Poll: Do you use a password manager?

Tech Republic Security

Password managers are convenient, affordable, and essential to secure your accounts. How do you lock down your sensitive business and personal data?

article thumbnail

Gallery: The top zero day Dark Web markets

Tech Republic Security

Cyberweapons, personal data, and corporate secrets are all available on the Dark Web. But where and how is stolen data bought and sold? Our expert hacker lists some of the top illicit online markets.

Marketing 115
article thumbnail

Windows 10 snooping: Microsoft will harvest less data but still awaits nod from watchdog

Tech Republic Security

Microsoft dials back data collection in its flagship OS but one privacy watchdog is still assessing whether the changes go far enough.

article thumbnail

Video: Top 5 HTTPS best practices

Tech Republic Security

Browsers and search engines are starting to expect HTTPS connections. Here are some tips for ensuring that your site is compatible, safe and secure.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

4 Windows Hello devices that will change the way you log into your PC

Tech Republic Security

Windows Hello is now found on almost 100 biometric-enabled devices. Here are some of the most interesting options for using the platform.

114
114
article thumbnail

The weaponized personal network of things could be on your doorstep before you know it

Tech Republic Security

Driven by gigabit ethernet, the Personal Internet of Things is breaking open new markets but might also allow hackers into your home. Cybersecurity experts explain how you might be vulnerable.

article thumbnail

The downside to the developer revolution: Big data (in)security

Tech Republic Security

Developers just want to 'get stuff done,' but may be putting their enterprise data at risk in the process. Here's why.

Big data 105
article thumbnail

Google Cloud ups encryption efforts with new key management service

Tech Republic Security

Google recently unveiled its Cloud Key Management Service in beta, which aims to be a scalable solution for management and auditing of encryption keys.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video: How BlackBerry QNX is going to make autonomous vehicles highly secure

Tech Republic Security

BlackBerry's QNX team is preparing to make connected cars and autonomous vehicles highly secure by using virtualization and advanced software. We caught up with the team at CES 2017.

article thumbnail

CES 2017: How BlackBerry plans to solve the IoT security threat

Tech Republic Security

The Internet of Things is arguably the biggest trend of CES 2017, but it's also a massive security risk. BlackBerry's Chief Security Officer explains how it can mitigate the IoT cybersecurity threat.

IoT 60
article thumbnail

Windows 10: Microsoft stops short of letting all users defer buggy updates

Tech Republic Security

A forthcoming feature that lets users pause updates to Windows 10 for up to 35 days won't be universally available.

69
article thumbnail

Ransomware: Global Damage

Spinone

Today, we are going to explore the damage that Ransomware brings and guide you how to ensure effective Ransomware protection. The Cyber Threat Alliance (CTA) conducted an in-depth study about the virus CryptoWall version 3 (CW3). So, we are sharing their analysis and publishing excerpts of the CryptoWall report: Ransomware is a type of malware that encrypts a victim’s files and subsequently demands payment in return for the key that can decrypt the said files.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Build an effective cyberattack recovery playbook by following this NIST guide

Tech Republic Security

Cybersecurity prevention efforts should not trump response capabilities. Experts at NIST spell out four steps to recovering from a cyberattack.

article thumbnail

Trump taps Rudy Giuliani to help with cybersecurity efforts

Tech Republic Security

US President-elect Donald Trump will look to former New York City mayor Rudy Giuliani to share insight and expertise on private sector cybersecurity issues.