Sat.Dec 10, 2016 - Fri.Dec 16, 2016

article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

article thumbnail

Seeing the Big Picture

Adam Shostack

This quote from Bob Iger, head of Disney, is quite interesting for his perspective as a leader of a big company: There is a human side to it that I try to apply and consider. [But] the harder thing is to balance with the reality that not everything is perfect. In the normal course of running a company this big, you’re going to see, every day, things that are not as great as you would have hoped or wanted them to be.

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Redux: compromising Linux using. SNES Ricoh 5A22 processor opcodes?!

Scary Beasts Security

Overview TL;DR: full reliable 0day drive-by exploit against Fedora 25 + Google Chrome, by breaking out of Super Nintendo Entertainment System emulation via cascading side effects from a subtle and interesting emulation error. Very full details follow. [ UPDATE 13 Dec 2016 -- a couple of competent readers inform me that I've named the wrong processor!

Media 86
article thumbnail

Your Money or Your File(s)!

NopSec

Growing up as a kid in the 80’s ransom used to be a simple thing. A bad person with a foreign accent would kidnap the loved one(s) of a square-jawed, wealthy protagonist and demand a large sum of money for their safe return. But kidnapping someone’s significant other, their child, or even their beloved pet chihuahua is risky business. The criminals have to first identify a wealthy individual, then get physically close to kidnap the target without being seen or caught in the process.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

4 ways your company can avoid Yahoo-level stupidity in enterprise security

Tech Republic Security

Yahoo recently confirmed a leak of one billion accounts, adding to its growing list of security woes. Here are four actions your company can take to prevent a similar debacle.

article thumbnail

Yahoo! Yippee? What to Do?

Adam Shostack

[Dec 20 update: The first draft of this post ended up with both consumer and enterprise advice, which made it complex. The enterprise half is now on the IANS blog: Never Waste a Good Crisis: Yahoo Edition.]. Yesterday, Yahoo disclosed that attackers broke into Yahoo in 2013 and stole details on a billion accounts. Brian Krebs summarizes what was taken, and also has a more general FAQ.

More Trending

article thumbnail

Privacy concerns about IoT devices won't be assuaged soon

Tech Republic Security

Researchers at Global Privacy Enforcement Network have found that an alarming number of IoT device systems do not protect the owner's privacy. Get the details.

IoT 125
article thumbnail

Using XaaS for your business? Then you need one of these multifactor authentication apps

Tech Republic Security

The password simply isn't secure anymore. Spyware, brute force attacks, dictionary attacks, and phishing can make circumventing passwords easy. Here are five tools to add an extra layer of security.

Spyware 116
article thumbnail

Video: The top 5 things to know about the blockchain

Tech Republic Security

The blockchain is best known as the system that validates Bitcoin transactions, but it has other potential uses. Here's what's essential to know about it.

119
119
article thumbnail

Nextcloud 11 cloud server: An impressive, security-focused update

Tech Republic Security

Nextcloud has finally released the latest iteration of its cloud server platform, and it's packed with security features. Get tips on upgrading to Nextcloud 11.

115
115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to protect Microsoft's Diagnostics and Recovery Toolset (DaRT) from unauthorized access

Tech Republic Security

DaRT is a robust toolkit that provides advanced troubleshooting utilities--but not all users should be granted access to all that power. See how to make sure only authorized users obtain access.

108
108
article thumbnail

Poll: Is the Yahoo hack the final straw?

Tech Republic Security

The latest Yahoo hack exposed over 1 billion users' accounts. Share your opinion: Can Yahoo recover, or will the data breach nuke Verizon's $4.8 billion acquisition of the internet portal?

Hacking 99
article thumbnail

How the DoD uses bug bounties to help secure the department's websites

Tech Republic Security

Secretary of Defense Ash Carter instigated the Hack the Pentagon bug bounty. The success of that program lead the DoD to launch the Hack the Army initiative and a Vulnerability Disclosure Policy.

Hacking 97
article thumbnail

How to encrypt and decrypt a folder on Android with SSE Universal Encryption

Tech Republic Security

Learn the process of encrypting and decrypting folders on your Android device with the help of SSE Universal Encryption.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Windows 10: Microsoft's Edge browser the latest to disable Flash by default

Tech Republic Security

Next year will see Microsoft reduce Flash to being click-to-play in Edge, as part of a bid to improve the browser's security, stability and battery drain.

81
article thumbnail

Police dogs: Now sniffing out electronic storage devices

Tech Republic Security

Criminals adapt, and so do the police—including their K9 dogs. The newest generation is being trained to sniff out electronic storage devices that police officers may miss.

60