Sat.Sep 10, 2016 - Fri.Sep 16, 2016

article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

IoT 167
article thumbnail

Azure Marketplace, Weekly ISO Builds

Kali Linux

Kali Linux in the Azure Marketplace Over the past couple of weeks we’ve been working on building and implementing Kali 2016.2 in the Azure Marketplace. We’re happy to announce that from today on, you can spin up a Kali machine from the Azure Marketplace. In just a few seconds, you can have a full penetration testing toolset at your fingertips for no additional cost (other than the standard Azure pricing).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

White House Issues Presidential Directive Coordinating Government Response To “Cyber Incidents”

Privacy and Cybersecurity Law

On July 26, 2016, President Obama issued a new Presidential Directive setting forth the framework for how the United States […].

article thumbnail

Six Effective Ransomware Risk Reduction Strategies

NopSec

Businesses, governments, and consumers alike need to be aware of ransomware – a type of malware that can inflict serious damage on your finances and productivity in a very short span of time. Today, we explain this category of malware: how it works, the risks it poses to your organization, and strategies for preventing an attack. How Ransomware Works Ransomware is a type of malware that deliberately interferes with the standard operation of a computer until a ransom is paid.

Risk 40
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Security breaches: How small businesses can avoid a HIPAA lawsuit

Tech Republic Security

The US government recently began investigating smaller healthcare cybersecurity breaches. Here's what it could mean for your business and how you can protect your company.

article thumbnail

Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware

Tech Republic Security

Eight of 12 tech decision makers polled said FBI warnings of ransomware and other cybersecurity attacks are valid, and that threats have increased in the past year.

More Trending

article thumbnail

Flexera's vulnerability update reveals critical flaws in both major and niche platforms

Tech Republic Security

There are thousands of security vulnerabilities out there, with more being discovered daily. Flexera's latest update points out some serious ones that all tech decision makers need to know about.

116
116
article thumbnail

Why investment firms and data breaches are an especially bad combination

Tech Republic Security

An investment firm's servers are full of sensitive data. The bad guys know it, and so does the SEC, along with a host of other regulatory bodies. Read lawyers' tips on avoiding data breaches.

article thumbnail

Volkswagen backs new cybersecurity firm to protect connected cars and autonomous vehicles

Tech Republic Security

The German automaker recently partnered with two Israeli technology companies to form a new firm that will protect against threats to future automobiles.

article thumbnail

HPE launches new data platform to increase security and visibility across enterprise IT

Tech Republic Security

At the HPE Protect 2016 conference, the company launched the HPE ArcSight Data Platform 2.0, with an open architecture and improved third-party integrations.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

IObit Applock: An app locker Android users can count on

Tech Republic Security

IObit Applock is the Android app locker you've been looking for. Follow the steps for installing and using this well-designed security tool.

128
128
article thumbnail

New Aruba Mobile First Platform could boost IoT security, improve UX

Tech Republic Security

HPE's Aruba released a new platform that leverages APIs to provide better insights about mobile and IoT infrastructure.

IoT 125
article thumbnail

Symantec looks to up the ante on SMB security with Endpoint Protection Cloud

Tech Republic Security

A new security product from Symantec hopes to better secure small businesses against ransomware and other targeted cyberattacks.