Sat.Jul 23, 2016 - Fri.Jul 29, 2016

article thumbnail

Zero Days: Why the disturbing Stuxnet documentary is a must-see

Tech Republic Security

Zero Days is a documentary by Oscar-winning filmmaker Alex Gibney about the cyberwarfare Pandora's Box that was opened with the Stuxnet malware. Find out why Jack Wallen highly recommends the film.

Malware 119
article thumbnail

Why CGC Matters to Me

ForAllSecure

By David Brumley. In 2008 I started as a new assistant professor at CMU. I sat down, thought hard about what I had learned from graduate school, and tried to figure out what to do next. My advisor in graduate school was Dawn Song , one of the top scholars in computer security. She would go on to win a MacArthur "Genius" Award in 2010. She's a hard act to follow.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CRTC ENFORCEMENT ADVISORY: REMEMBER, YOU MUST HAVE RECORDS TO PROVE CONSENT

Privacy and Cybersecurity Law

The Canadian Radio-television and Telecommunications Commission (CRTC) issued an enforcement advisory to both businesses and individuals that send commercial electronic […].

article thumbnail

Ransomware 2.0 is around the corner and it's a massive threat to the enterprise

Tech Republic Security

The profits from ransomware are making it one of the fastest growing types of malware and new versions could negatively impact entire industries, according to a Cisco report.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

New US cybersecurity plan makes it easier for businesses to get help after an attack

Tech Republic Security

US President Barack Obama recently published a policy directive for cyber incident coordination, which outlines how the government should respond to cybersecurity attacks.

article thumbnail

10 tips to avoid ransomware attacks

Tech Republic Security

As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect.

More Trending

article thumbnail

How to work with PGP keys using GnuPG

Tech Republic Security

To encrypt email and files, you need to know how to work with PGP keys. Get up to speed on generating, exporting, and importing encryption keys with GnuPG.

article thumbnail

IoT hidden security risks: How businesses and telecommuters can protect themselves

Tech Republic Security

There are a plethora of IoT-connected devices that create a huge security risk for companies, whether at the corporate office, or at an employee's home office.

IoT 107
article thumbnail

Kevin Mitnick: User training could have prevented DNC email hacks

Tech Republic Security

Everyone from famed hacker Kevin Mitnick to the IEEE Computer Society agree that a little end user training goes a long way in preventing phishing attacks.

Hacking 106
article thumbnail

Why an eye scan could soon unlock Samsung and Apple phones

Tech Republic Security

Leaked images and rumors surrounding the Galaxy Note 7 and 2018 iPhone suggest that users can unlock phones and potentially make purchases with an iris scanning camera. Here's how it would work.

97
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Data vs. cyber threats: New IBM app uses analytics to fight back

Tech Republic Security

IBM recently released QRadar User Behavior Analytics, a new app that analyzes usage patterns to determine insider threats.

article thumbnail

Video: Why political organizations' lax security practices are 'red meat for hackers'

Tech Republic Security

TechRepublic's Dan Patterson and podcaster Justin Robert Young discussed the latest hacks on the DNC and why attacks are becoming more common.

Hacking 90
article thumbnail

SmartFlow Professional wants to help you stop software piracy and collect lost revenue

Tech Republic Security

SmartFlow Professional is designed to stop revenue loss due to piracy. This entry-level software package has just received a makeover, which is great for small developers who build expensive software.

article thumbnail

Infographic: The 5 phases of a ransomware attack

Tech Republic Security

How to defend against attackers and avoid ransom demands.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.