Sat.Dec 10, 2016 - Fri.Dec 16, 2016

article thumbnail

4 ways your company can avoid Yahoo-level stupidity in enterprise security

Tech Republic Security

Yahoo recently confirmed a leak of one billion accounts, adding to its growing list of security woes. Here are four actions your company can take to prevent a similar debacle.

article thumbnail

Yahoo! Yippee? What to Do?

Adam Shostack

[Dec 20 update: The first draft of this post ended up with both consumer and enterprise advice, which made it complex. The enterprise half is now on the IANS blog: Never Waste a Good Crisis: Yahoo Edition.]. Yesterday, Yahoo disclosed that attackers broke into Yahoo in 2013 and stole details on a billion accounts. Brian Krebs summarizes what was taken, and also has a more general FAQ.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Your Money or Your File(s)!

NopSec

Growing up as a kid in the 80’s ransom used to be a simple thing. A bad person with a foreign accent would kidnap the loved one(s) of a square-jawed, wealthy protagonist and demand a large sum of money for their safe return. But kidnapping someone’s significant other, their child, or even their beloved pet chihuahua is risky business. The criminals have to first identify a wealthy individual, then get physically close to kidnap the target without being seen or caught in the process.

article thumbnail

Redux: compromising Linux using. SNES Ricoh 5A22 processor opcodes?!

Scary Beasts Security

Overview TL;DR: full reliable 0day drive-by exploit against Fedora 25 + Google Chrome, by breaking out of Super Nintendo Entertainment System emulation via cascading side effects from a subtle and interesting emulation error. Very full details follow. [ UPDATE 13 Dec 2016 -- a couple of competent readers inform me that I've named the wrong processor!

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

article thumbnail

Seeing the Big Picture

Adam Shostack

This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.

LifeWorks

More Trending

article thumbnail

Two features that make Wire Private Message a must have for business users

Tech Republic Security

If you're looking for a way to enable your staff to more reliably and securely communicate with one another, here are two reasons why Wire should be your tool of choice.

article thumbnail

Nextcloud 11 cloud server: An impressive, security-focused update

Tech Republic Security

Nextcloud has finally released the latest iteration of its cloud server platform, and it's packed with security features. Get tips on upgrading to Nextcloud 11.

article thumbnail

Using XaaS for your business? Then you need one of these multifactor authentication apps

Tech Republic Security

The password simply isn't secure anymore. Spyware, brute force attacks, dictionary attacks, and phishing can make circumventing passwords easy. Here are five tools to add an extra layer of security.

article thumbnail

Video: The top 5 things to know about the blockchain

Tech Republic Security

The blockchain is best known as the system that validates Bitcoin transactions, but it has other potential uses. Here's what's essential to know about it.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How the DoD uses bug bounties to help secure the department's websites

Tech Republic Security

Secretary of Defense Ash Carter instigated the Hack the Pentagon bug bounty. The success of that program lead the DoD to launch the Hack the Army initiative and a Vulnerability Disclosure Policy.

article thumbnail

Poll: Is the Yahoo hack the final straw?

Tech Republic Security

The latest Yahoo hack exposed over 1 billion users' accounts. Share your opinion: Can Yahoo recover, or will the data breach nuke Verizon's $4.8 billion acquisition of the internet portal?

article thumbnail

Windows 10: Microsoft's Edge browser the latest to disable Flash by default

Tech Republic Security

Next year will see Microsoft reduce Flash to being click-to-play in Edge, as part of a bid to improve the browser's security, stability and battery drain.

article thumbnail

How to protect Microsoft's Diagnostics and Recovery Toolset (DaRT) from unauthorized access

Tech Republic Security

DaRT is a robust toolkit that provides advanced troubleshooting utilities--but not all users should be granted access to all that power. See how to make sure only authorized users obtain access.

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

How to encrypt and decrypt a folder on Android with SSE Universal Encryption

Tech Republic Security

Learn the process of encrypting and decrypting folders on your Android device with the help of SSE Universal Encryption.

article thumbnail

Police dogs: Now sniffing out electronic storage devices

Tech Republic Security

Criminals adapt, and so do the police—including their K9 dogs. The newest generation is being trained to sniff out electronic storage devices that police officers may miss.