Sat.Oct 29, 2016 - Fri.Nov 04, 2016

article thumbnail

Tor: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about Tor, the onion router web browser that allows users to access the Dark Web and other encrypted websites.

article thumbnail

Five Ways to Ward off the Horrors of Cybersecurity

CompTIA on Cybersecurity

What ghastly horrors are lurking behind firewalls and in dark corners behind flickering monitors this Halloween? Read on to face the frighteningly dark realms of cybersecurity and get five steps you can take to protect yourself today – as well as a particularly useful tool for you and your company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Germany to audit 500 companies on data transfers

Privacy and Cybersecurity Law

Germany to audit 500 companies The German data protection authorities have announced today that they have chosen 500 companies throughout […].

52
article thumbnail

Why your company needs a social media policy

Tech Republic Security

Half of employees say that their company does not have rules about using social media at work. Here's what you need to craft a social media policy to protect your data and avoid legal trouble.

Media 152
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Can you solve some of the most complicated cryptographic puzzles in the world?

Tech Republic Security

The UK's Government Communication Headquarters (GCHQ) are some of the best code breakers in the world. Think you have what it takes to be a cryptanalyst? Find out here.

article thumbnail

How to quickly audit a Linux system from the command line

Tech Republic Security

For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.

167
167

More Trending

article thumbnail

Over one billion installs of apps using OAuth 2.0 can be remotely hijacked, say researchers

Tech Republic Security

OAuth 2.0 allows apps to verify credentials with Facebook or Google logins. One problem: over 41% of apps using OAuth 2.0 aren't actually validating user info, allowing account hijacks.

article thumbnail

Google boasts HTTPS adoption numbers, gives advice to businesses making the switch

Tech Republic Security

Google recently announced that more than half the pages loaded by Chrome desktop users occurred over an HTTPS connection, and called for increased adoption of the protocol.

132
132
article thumbnail

Firms that force you to change your password are clueless says cyber security chief

Tech Republic Security

Security expert rails against the bad advice that everybody follows and the industry's addiction to hyperbole.

Passwords 161
article thumbnail

Gaps starting to close in cyberinsurance policies

Tech Republic Security

Insurance companies are starting to fill the loopholes in their cybersecurity products, which could prevent costly lawsuits and angry customers down the road.

Insurance 126
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

We could lose the internet, warns security researcher Dan Kaminsky

Tech Republic Security

Well-known security researcher Dan Kaminsky suggests how to save the internet by modeling cybersecurity after the NIH.

Internet 142