Sat.May 06, 2017 - Fri.May 12, 2017

article thumbnail

9 best practices to improve security in industrial IoT

Tech Republic Security

Dell EMC's senior product manager for IoT security, Rohan Kotian, hosted a presentation at Dell EMC World explaining how industrial enterprises can protect their IoT deployments.

IoT 167
article thumbnail

Proving missing ASLR on dropbox.com and box.com over the web for a $343 bounty :D

Scary Beasts Security

Overview Cloud file storage providers such as Box and DropBox will typically thumbnail uploaded images for purposes of showing icons and previews. Predictably, both providers appear to use ImageMagick for thumbnailing. So what happens if we come knocking with the ImageMagick 1-day CESA-2017-0002? CESA-2017-0002 is a vulnerability in the RLE image decoder, where the allocated render canvas memory is not initialized under some conditions.

62
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New ABA Opinion – Attorneys Must Take Reasonable Cybersecurity Measures To Protect Client Data

Privacy and Cybersecurity Law

On May 11, 2017, the American Bar Association (ABA) issued Formal Opinion 477, making clear that a lawyer may transmit information […].

article thumbnail

4 questions businesses should be asking about cybersecurity attacks

Tech Republic Security

At the 2017 Dell EMC World conference, RSA senior director of advanced cyber defense, Peter Tran, walked through examples of real-world IT questions and how they could be answered.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms

Tech Republic Security

It's a shocking discovery that could shake your concept of security to its core: Those trusted to protect your networks are ignoring their own policies. Is something rotten in the state of cybersec?

article thumbnail

Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

Tech Republic Security

Ransomware cost businesses more than $1B last year, and SMBs are particularly susceptible to attack. Here are some tips and best practices for keeping your company safe.

LifeWorks

More Trending

article thumbnail

HP users beware: Laptops revealed to have built-in keylogger

Tech Republic Security

Several models of the HP EliteBook, ProBook, and other machines may be recording every keystroke you make. Here's how to fix the problem.

134
134
article thumbnail

The best security? Have Zero Trust, says expert

Tech Republic Security

If you want real security, you have to learn not to trust anyone, says ex-PagerDuty expert.

134
134
article thumbnail

Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits

Tech Republic Security

Two members of Google's Project Zero discovered a serious exploit over the weekend. It's so bad it can take over a system just by sending an email-no opening or reading necessary.

129
129
article thumbnail

6 tips to protect your G Suite account from phishing scams

Tech Republic Security

After last week's phishing attack, Google detailed how it protects users, and what business customers can do to avoid similar scams.

Scams 129
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to register an ASA SFR module with the FirePOWER Management Center

Tech Republic Security

To operate a FirePOWER Module in a Cisco ASA there are specific steps that must be followed to allow communication with the FireSIGHT management center. This article details that process.

123
123
article thumbnail

Major ransomware attack hits hospitals in England, shutting down IT systems

Tech Republic Security

Hospitals and doctor's surgeries across England are having to cancel non-emergency operations after a major ransomware attack on the National Health Service.

article thumbnail

Industrial robots are more vulnerable to cyberattacks than you think

Tech Republic Security

A new report from Trend Micro indicates that industrial robots are targets for hackers and cybercriminals. Find out the researchers' proposed solution to a more secure robotic ecosystem.

122
122
article thumbnail

Android Security Bulletin May 2017: What you need to know

Tech Republic Security

The May 2017 Android Security Bulletin shatters its previous record of critical vulnerabilities. Get the highlights.

122
122
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Beyond the fingerprint: IBM bolsters enterprise app security with behavioral biometrics

Tech Republic Security

IBM and SecuredTouch are bringing new behavioral biometric authentication based on factors such as typing patterns to enterprise applications.

article thumbnail

Cracking Hitler's unbreakable code: How the Colossus computer helped beat the Nazis

Tech Republic Security

Hear recollections from Bletchley Park veterans on how efforts to crack the Lorenz cipher led to the creation of one of the world's first computers.

122
122
article thumbnail

How online marketplace Silk Road became the Craigslist for illegal drugs

Tech Republic Security

In less than two years, a Dark Web marketplace created by a twenty-something libertarian from Texas had generated more than $1.2 billion by selling drugs, weapons and cyanide online.

113
113
article thumbnail

Video: This smart firewall can protect your home office and business from hidden cyberattacks

Tech Republic Security

Today 6.4 billion devices connect to the Internet, and another 50 billion are expected to come online soon. CUJO CEO Leon Kuperman explains how to say safe in a world loaded with IoT threats.

Firewall 103
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Video: How the founder of the Silk Road made millions on his illegal startup on the Dark Web

Tech Republic Security

TechRepublic caught up with Nick Bilton, author of American Kingpin, the story of how Ross Ulbricht created an online marketplace for drugs and weapons, generating more than $1.2 billion on the Dark Web.

93
article thumbnail

Video: The Colossus computer and codebreakers who cracked Hitler's secret messages

Tech Republic Security

The lesser known, but no less important veterans of Bletchley Park's World War II efforts

90
article thumbnail

[0day] Proving Box.com fixed ASLR via ImageMagick uninitialized zlib stream buffer

Scary Beasts Security

Overview In my previous post, we explored using an ImageMagick 0day (now a 1day) in the RLE decoder to to determine missing ASLR in both box.com and dropbox.com. In response, both Box and DropBox sensibly limited the available decoders. Both dropped RLE support and lots more. As you may recall from a different but related post , I had challenges working with Box to accurately determine the status of security reports I submitted.

51
article thumbnail

NIST Releases Draft Guidance On Securing Wireless Infusion Pumps In The Healthcare Industry

Privacy and Cybersecurity Law

On May 8, 2017, the National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), […].

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

HHS Plans To Launch Cybersecurity Center Focused On Medical App Security

Privacy and Cybersecurity Law

The US Department of Health and Human Services (HHS) announced on April 20 that it plans to launch a cybersecurity initiative modeled […].

article thumbnail

DHS Warns Congress On Mobile Device Security

Privacy and Cybersecurity Law

On May 4, 2017, the US Department of Homeland Security (DHS) submitted a new study to Congress that detailed current and emerging […].

Mobile 40
article thumbnail

Video: Trump's cybersecurity order wants to move all federal IT to the cloud

Tech Republic Security

Experts aren't sure it's completely feasible, or the ideal move, however.

article thumbnail

Trump administration to move all federal IT into the cloud: Is it realistic?

Tech Republic Security

US president Donald Trump recently signed an executive order on cybersecurity that mandated federal systems move to the cloud. But, questions remain on the feasibility of that goal.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Trump's cybersecurity executive order: 4 things you need to know

Tech Republic Security

On Thursday, US President Donald Trump signed an executive order to enhance cybersecurity across the nation's infrastructure. Here are the top takeaways.

article thumbnail

White House Signs New Cybersecurity Executive Order

Privacy and Cybersecurity Law

On May 11, 2017, President Donald Trump signed a new Executive Order on cybersecurity entitled Strengthening the Cybersecurity of Federal Networks and […].