Sat.Mar 25, 2017 - Fri.Mar 31, 2017

article thumbnail

New IBM security tool uses machine learning to help businesses detect phishing

Tech Republic Security

A new solution from IBM Trusteer automates website classification and can help label phishing websites 250% faster than traditional methods.

Phishing 167
article thumbnail

Black box discovery of memory corruption RCE on box.com

Scary Beasts Security

Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Reflection on Working From Home

The Falcon's View

In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.

article thumbnail

Your internet history is now for sale. Here's how you can protect it

Tech Republic Security

Congress has voted to repeal restrictions preventing ISPs from gathering and selling your browsing data and other personal info. Here's how you can protect yourself.

Internet 166
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

article thumbnail

Search the world's largest cybercrime library

Tech Republic Security

The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, prosecutors, and judges.

LifeWorks

More Trending

article thumbnail

Congress just dismantled FCC rules protecting web browsing history: What it means

Tech Republic Security

Republicans in Congress just voted to strip away guidelines protecting web browsing data for consumers, in a landmark victory for ISPs including AT&T, Verizon, and Comcast.

148
148
article thumbnail

How to install and use eCryptfs on Ubuntu

Tech Republic Security

If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.

article thumbnail

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

Tech Republic Security

Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.

Hacking 144
article thumbnail

Businesses beware: Smartphone malware rises 400% in 2016, Nokia reports

Tech Republic Security

Android smartphones and Internet of Things devices are increasingly at risk of attack, according to a new Nokia report. Here's how to keep your business safe.

Malware 141
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

SecureMyEmail is email encryption for everyone

Tech Republic Security

If you're looking for the simplest route to email encryption, SecureMyEmail might be the answer.

article thumbnail

Verizon's new app launcher brings spyware to all its Android phones, says EFF

Tech Republic Security

Verizon's impending release of a new app launcher for Android called AppFlash has some privacy experts worried, as the launcher collects a lot of personal information for advertising.

Spyware 128
article thumbnail

European debate on encrypted apps heating up with possibility of new backdoor laws

Tech Republic Security

New laws being considered in the EU would force internet companies to provide police with access to encrypted data from consumers on internet messaging apps.

article thumbnail

US Congress votes on FCC rules: Why your web history could be at risk

Tech Republic Security

A House vote on federal rules regarding broadband privacy could put your web browsing history at stake, allowing ISPs to sell your information to advertisers.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Video Interview: How cognitive AI and Watson detect and deter modern cyber-threats

Tech Republic Security

Live from the X-Force Command Center IBM's VP of Threat Intelligence Caleb Barlow explains how AI can fight off hackers, and details why and how your company should run data breach response drills.

article thumbnail

Mobile malware is up 400% from last year, and Android is the most infected

Tech Republic Security

Android devices account for a vast majority of mobile malware infections. Could you be at risk?

Mobile 84