Sat.Jul 29, 2017 - Fri.Aug 04, 2017

article thumbnail

How to build security into your company's IoT plan

Tech Republic Security

As the IoT market booms, it's essential your company develops long-term cybersecurity solutions. These tips will help you prepare.

IoT 166
article thumbnail

Pen Testing Toolkit: Tools & Antivirus Software Evasion Techniques

NopSec

Antivirus software is one of the oldest and the most ever present security control against malware and various types of malicious software. It’s historically focused on blocking viruses, then eventually evolved into blocking all sort of other malware. “I have antivirus so I’m covered” used have some legitimate weight to it. Lately, however, attacks have been growing more sophisticated, specifically trying to stay under the radar using administrator toolkits and evading virus signatures to bypass

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Titles, Jobs, and Job Descriptions (Not All Roles Are Architects)

The Falcon's View

Folks: Please stop calling every soup-to-nuts, everything-but-the-kitchen-sink security job a "security architect" role. It's harmful to the industry and it's doing you no favors trying to find the right resources. In fact, please stop posting these "one role does everything security under the sun" positions altogether. It's hurting your recruitment efforts, and it makes it incredibly difficult to find positions that are a good fit.

article thumbnail

How Ransomware Hackers Cash Out Bitcoins

Spinone

Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Russia VPN ban: What tech pros and business travelers need to know

Tech Republic Security

Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.

VPN 162
article thumbnail

AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses

Tech Republic Security

Researchers have created an AI that tweaks malware code, and it easily bypassed an anti-malware AI undetected. Is machine learning ready to face down cybersecurity threats?

LifeWorks

More Trending

article thumbnail

Microsoft 365: The smart person's guide

Tech Republic Security

For SMBs, deploying a secure, integrated, and mobile collaborative working environment that doesn't break the bank is nearly impossible. Microsoft 365 is designed to make it not only possible, but easy.

Banking 130
article thumbnail

62% of cybersecurity experts believe AI will be weaponized in next year

Tech Republic Security

A recent survey of infosec professionals, conducted by Cylance, found that many believe artificial intelligence will soon be used to conduct cyberattacks.

article thumbnail

Video: How the GDPR will affect cloud data security

Tech Republic Security

Joel Benavides, Senior Director Global Legal and Advocacy at cloud data host Box, explains how the General Data Protection Regulation will impact cloud-stored data.

107
107
article thumbnail

How to make Tor less vulnerable to RAPTOR attacks

Tech Republic Security

Internet users have few options when it comes to online privacy. Tor is one of them, but researchers at Princeton say there are problems. Find out what they are, and how they could be fixed.

Internet 104
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Video: Why cybersecurity solutions are essential for new IoT products

Tech Republic Security

There will soon be 50 billion IoT in the market. Lastwall CEO Karl Holmqvist, and Global Cybersecurity Summit organizer Ryan Brack explain why cybersecurity solutions require long-term planning.

IoT 104
article thumbnail

British interior minister calls on Silicon Valley tech giants to fight terrorism

Tech Republic Security

Britain's Home Secretary Amber Rudd is traveling to Silicon Valley, where she is expected to meet with leaders from firms such as YouTube, to discuss tackling extremist content online.

102
102
article thumbnail

Video: iOS beats out Android as the number one target for mobile phishing attacks

Tech Republic Security

Mobile phishing is on the rise, and most of it is targeting iOS. It's also moving away from your inbox and into apps, where it's much harder to catch.

Mobile 102
article thumbnail

5 ways to create a secure firewall

Tech Republic Security

Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Why one cybersecurity startup uses real malware and real attacks to test your company's defenses

Tech Republic Security

Penetration testing company Cymulate can attack your network from multiple vectors, but what really matters is how you use the results to improve your security.

article thumbnail

Massive DDoS attack lasts for 277 hours, highlighting growth of extended attacks on businesses

Tech Republic Security

In 2017, Q2 saw a DDoS attack that lasted 277 hours, according to a new report from Kaspersky Lab. Here's how to keep your company safe.

DDOS 96
article thumbnail

Report: 71% of SMBs are not prepared for cybersecurity risks

Tech Republic Security

Malware, mobile, and phishing attacks top the list of business security concerns, according to a new report from Webroot.

Risk 94
article thumbnail

How your company can decide where to store its cloud data

Tech Republic Security

Coming May 2018, the GDPR will come into effect. Make sure your company knows how to best respond.

90
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cyberattack on industrial control systems can put a whole nation at risk

Tech Republic Security

Ukraine is a hotspot for cyberattacks and there's a lot companies can learn from the country's experience in cyberwar.

Risk 90
article thumbnail

Video: How to learn what hackers want

Tech Republic Security

There is a lot of money to be gained by attacking corporate systems, but not all attackers are motivated by money. To best way to stay secure is to understand what attackers want, say Lastwall CEO Karl Holmqvist and Global Cybersecurity Summit organizer Ryan Brack.

article thumbnail

Beyond bitcoin: How blockchains could revolutionize business

Tech Republic Security

Blockchain4EU will spend this year uncovering uses for blockchains and other Distributed Ledger Technologies beyond their use in cryptocurrencies.

article thumbnail

Gallery: How to erase yourself from the internet

Tech Republic Security

Want to disappear from the internet? It's not easy, but there are steps you can take to minimize your presence.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

IoT products may soon require US government security check

Tech Republic Security

A new bill introduced by the senate would require IoT products used by government entities to meet standards for patchability, password management, and more.

IoT 84
article thumbnail

Security flaw made 175,000 IoT cameras vulnerable to becoming spy cams for hackers

Tech Republic Security

Camera models from Shenzhen Neo Electronics are vulnerable to cyber attacks, according to security firm Bitdefender.

IoT 84
article thumbnail

How one simple hack can turn your Amazon Echo into a spy device

Tech Republic Security

MWR InfoSecurity recently found that a particular physical exploit can be used to install a certain piece of malware to leverage the microphone on Amazon's Alexa-powered home speaker.

Hacking 79
article thumbnail

Video: Your Amazon Echo fears may be more real than you think

Tech Republic Security

Researchers recently discovered a method of hacking Amazon Echoes in order to capture all the audio it hears and stream it anywhere the attacker wants.

Hacking 79
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Video: Ukraine is a testbed sandbox for cyber-attacks that target companies and governments around the world

Tech Republic Security

Ukraine's power grid, railways, and national election system have all recently been attacked. Karl Holmqvist, CEO of Lastwall and Ryan Brack, Organizer of the Global Cybersecurity Summit explain the lessons every company should learn about cyberwar.

article thumbnail

Video: Are ex-employees your biggest security risk?

Tech Republic Security

It might not be outside hackers, or even those currently employed, that are your biggest risk. It's more likely someone who was recently fired and has a grudge.

Risk 74
article thumbnail

New Firefox feature allows users to send 1GB encrypted files that self-destruct

Tech Republic Security

Firefox recently announced a host of new pilot experiments aiming to make the browser simpler, faster, and safer to use, especially in the enterprise.

article thumbnail

Why ex-employees may be your company's biggest cyberthreat

Tech Republic Security

Some 20% of organizations say they have experienced data breaches by ex-employees. Here's how IT leaders can protect their business.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!