Sat.Aug 27, 2016 - Fri.Sep 02, 2016

article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

Kali Linux 2016.2 Release

Kali Linux

We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re launching our second Kali Rolling ISO release aka Kali 2016.2. This release brings a whole bunch of interesting news and updates into the world of Kali and we’re excited to tell you all about it. New KDE, MATE, LXDE, e17, and Xfce Builds Although users are able to build and customize their Kali Linux ISOs however they wish, we often hear people comment about how they would love to see K

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CASL compliance undertakings continue to mount

Privacy and Cybersecurity Law

Another company that is well-known to consumers has agreed to enter into a compliance undertaking with the CRTC for alleged […].

article thumbnail

Governments and nation states are now officially training for cyberwarfare: An inside look

Tech Republic Security

Europe, Canada, USA, Australia, and others are now running training exercises to prepare for the outbreak of cyberwar. Locked Shields is the largest simulation and we take you inside.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The five military OPSEC steps that businesses can learn from

Tech Republic Security

The most well-trained military in the world will be completely ineffective if operational info is leaked. Find out what the military does to stay secure and how it can be applied to business.

111
111
article thumbnail

Update all iOS devices to 9.3.5 immediately, or risk a remote jailbreak

Tech Republic Security

A critical new Apple iOS update patches three iOS flaws that cybercriminals used to steal confidential messages and eavesdrop using device cameras and microphones.

Risk 112

More Trending

article thumbnail

How to enable two-factor authentication on Nextcloud 10

Tech Republic Security

If you're running a Nextcloud 10 server and worrying about security, follow these steps to set up two-factor authentication and add an extra layer of protection for your users' data.

article thumbnail

How to force users to create secure passwords on Linux

Tech Republic Security

Strong passwords are a must. But if your servers and desktops don't require strong passwords, you can't enforce such a policy. Here's a step-by-step buide to enabling strong passwords on your Ubuntu machines with the help of PAM.

article thumbnail

Self-checking chips could eliminate hardware security issues

Tech Republic Security

Researchers may have found a way to validate chips, so all concerned parties are satisfied the silicon is backdoor-free.

72
article thumbnail

The Ashley Madison Breach: Canada-Australia Report of Investigation and Takeaways for all Organizations

Privacy and Cybersecurity Law

On August 23, 2016, the Office of the Privacy Commissioner of Canada (OPC) released its joint report with the Office […].

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.