Sat.Jul 29, 2017 - Fri.Aug 04, 2017

article thumbnail

Russia VPN ban: What tech pros and business travelers need to know

Tech Republic Security

Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.

VPN 154
article thumbnail

Pen Testing Toolkit: Tools & Antivirus Software Evasion Techniques

NopSec

Antivirus software is one of the oldest and the most ever present security control against malware and various types of malicious software. It’s historically focused on blocking viruses, then eventually evolved into blocking all sort of other malware. “I have antivirus so I’m covered” used have some legitimate weight to it. Lately, however, attacks have been growing more sophisticated, specifically trying to stay under the radar using administrator toolkits and evading virus signatures to bypass

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Titles, Jobs, and Job Descriptions (Not All Roles Are Architects)

The Falcon's View

Folks: Please stop calling every soup-to-nuts, everything-but-the-kitchen-sink security job a "security architect" role. It's harmful to the industry and it's doing you no favors trying to find the right resources. In fact, please stop posting these "one role does everything security under the sun" positions altogether. It's hurting your recruitment efforts, and it makes it incredibly difficult to find positions that are a good fit.

article thumbnail

How Ransomware Hackers Cash Out Bitcoins

Spinone

Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to build security into your company's IoT plan

Tech Republic Security

As the IoT market booms, it's essential your company develops long-term cybersecurity solutions. These tips will help you prepare.

IoT 154
article thumbnail

iOS users beware: You're the biggest target for mobile phishing attacks

Tech Republic Security

Phishing continues to be a problem, and attacks are moving away from the email inbox. A new report found that iOS is the biggest target, with most attacks coming from game apps.

Phishing 124

More Trending

article thumbnail

62% of cybersecurity experts believe AI will be weaponized in next year

Tech Republic Security

A recent survey of infosec professionals, conducted by Cylance, found that many believe artificial intelligence will soon be used to conduct cyberattacks.

article thumbnail

Microsoft 365: The smart person's guide

Tech Republic Security

For SMBs, deploying a secure, integrated, and mobile collaborative working environment that doesn't break the bank is nearly impossible. Microsoft 365 is designed to make it not only possible, but easy.

Banking 85
article thumbnail

Why one cybersecurity startup uses real malware and real attacks to test your company's defenses

Tech Republic Security

Penetration testing company Cymulate can attack your network from multiple vectors, but what really matters is how you use the results to improve your security.

article thumbnail

5 ways to create a secure firewall

Tech Republic Security

Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Massive DDoS attack lasts for 277 hours, highlighting growth of extended attacks on businesses

Tech Republic Security

In 2017, Q2 saw a DDoS attack that lasted 277 hours, according to a new report from Kaspersky Lab. Here's how to keep your company safe.

DDOS 84
article thumbnail

How to make Tor less vulnerable to RAPTOR attacks

Tech Republic Security

Internet users have few options when it comes to online privacy. Tor is one of them, but researchers at Princeton say there are problems. Find out what they are, and how they could be fixed.

article thumbnail

How one simple hack can turn your Amazon Echo into a spy device

Tech Republic Security

MWR InfoSecurity recently found that a particular physical exploit can be used to install a certain piece of malware to leverage the microphone on Amazon's Alexa-powered home speaker.

Hacking 68
article thumbnail

Video: How the GDPR will affect cloud data security

Tech Republic Security

Joel Benavides, Senior Director Global Legal and Advocacy at cloud data host Box, explains how the General Data Protection Regulation will impact cloud-stored data.

72
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Video: iOS beats out Android as the number one target for mobile phishing attacks

Tech Republic Security

Mobile phishing is on the rise, and most of it is targeting iOS. It's also moving away from your inbox and into apps, where it's much harder to catch.

Mobile 75
article thumbnail

Video: Why cybersecurity solutions are essential for new IoT products

Tech Republic Security

There will soon be 50 billion IoT in the market. Lastwall CEO Karl Holmqvist, and Global Cybersecurity Summit organizer Ryan Brack explain why cybersecurity solutions require long-term planning.

IoT 67
article thumbnail

British interior minister calls on Silicon Valley tech giants to fight terrorism

Tech Republic Security

Britain's Home Secretary Amber Rudd is traveling to Silicon Valley, where she is expected to meet with leaders from firms such as YouTube, to discuss tackling extremist content online.

67
article thumbnail

IoT products may soon require US government security check

Tech Republic Security

A new bill introduced by the senate would require IoT products used by government entities to meet standards for patchability, password management, and more.

IoT 71
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Beyond bitcoin: How blockchains could revolutionize business

Tech Republic Security

Blockchain4EU will spend this year uncovering uses for blockchains and other Distributed Ledger Technologies beyond their use in cryptocurrencies.

article thumbnail

Report: 71% of SMBs are not prepared for cybersecurity risks

Tech Republic Security

Malware, mobile, and phishing attacks top the list of business security concerns, according to a new report from Webroot.

Risk 82
article thumbnail

Video: How to learn what hackers want

Tech Republic Security

There is a lot of money to be gained by attacking corporate systems, but not all attackers are motivated by money. To best way to stay secure is to understand what attackers want, say Lastwall CEO Karl Holmqvist and Global Cybersecurity Summit organizer Ryan Brack.

article thumbnail

Video: Ukraine is a testbed sandbox for cyber-attacks that target companies and governments around the world

Tech Republic Security

Ukraine's power grid, railways, and national election system have all recently been attacked. Karl Holmqvist, CEO of Lastwall and Ryan Brack, Organizer of the Global Cybersecurity Summit explain the lessons every company should learn about cyberwar.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Cyberattack on industrial control systems can put a whole nation at risk

Tech Republic Security

Ukraine is a hotspot for cyberattacks and there's a lot companies can learn from the country's experience in cyberwar.

Risk 77
article thumbnail

What the Swedish government's data leak disaster can teach companies about third-party security

Tech Republic Security

The Swedish Transport Agency outsourced IT work to third parties without mandating security clearance for staff, leading other nations to access sensitive government data.

article thumbnail

Video: Are ex-employees your biggest security risk?

Tech Republic Security

It might not be outside hackers, or even those currently employed, that are your biggest risk. It's more likely someone who was recently fired and has a grudge.

Risk 60
article thumbnail

New Firefox feature allows users to send 1GB encrypted files that self-destruct

Tech Republic Security

Firefox recently announced a host of new pilot experiments aiming to make the browser simpler, faster, and safer to use, especially in the enterprise.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Gallery: How to erase yourself from the internet

Tech Republic Security

Want to disappear from the internet? It's not easy, but there are steps you can take to minimize your presence.

article thumbnail

Concerned about browsing privacy? Here's how to install Firefox Focus

Tech Republic Security

If you're looking for an Android browser that makes blocking trackers and clearing your history, look no further than Firefox Focus. Here's how to install it.

60
article thumbnail

Security flaw made 175,000 IoT cameras vulnerable to becoming spy cams for hackers

Tech Republic Security

Camera models from Shenzhen Neo Electronics are vulnerable to cyber attacks, according to security firm Bitdefender.

IoT 71
article thumbnail

Video: Your Amazon Echo fears may be more real than you think

Tech Republic Security

Researchers recently discovered a method of hacking Amazon Echoes in order to capture all the audio it hears and stream it anywhere the attacker wants.

Hacking 61
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.