Sat.Mar 11, 2017 - Fri.Mar 17, 2017

article thumbnail

Bad news, Android devs: 40 percent of apps in the market are leaving sensitive backdoors exposed

Tech Republic Security

Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.

Marketing 137
article thumbnail

We have your data: how to fight ransomware

Andrew Hay

Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Doing Diversity Right: Turning Employment Obstacles into Opportunities

NopSec

Blind assumptions about online security are not the only assumptions that demand attention in the cybersecurity industry today. An article NopSec published late last year (“ Your Money or Your File(s)! “) opens with a familiar image of the popular face of “ransom” in western society’s 80s culture: “A bad person with a foreign accent would kidnap the loved one(s) of a square-jawed, wealthy protagonist and demand a large sum of money for their safe return.

article thumbnail

Report: Ransomware attacks grew 600% in 2016, costing businesses $1B

Tech Republic Security

Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Report: 48% more IT professionals are taking security training

Tech Republic Security

As cyber attacks continue to make headlines, more IT professionals are undergoing security training and assessments, paid for by their employers, according to a new report.

article thumbnail

35% of LinkedIn users' passwords are weak enough to hack

Tech Republic Security

More than 63 million LinkedIn users employ common passwords, or reuse passwords, putting them at risk for cyber attacks. Here's how to protect your company.

Passwords 124

More Trending

article thumbnail

Report: Hybrid cloud dominates in Europe, adoption driven by security concerns

Tech Republic Security

A recent study from NetApp examined the growing use of hybrid cloud infrastructure in Europe, noting that storage and backup were the most listed use cases.

Backups 120
article thumbnail

How to enable https on Apache CentOS

Tech Republic Security

For some businesses, serving up websites via HTTPS is a must-have. Here's how to configure secure http Apache on CentOS.

132
132
article thumbnail

Researchers use $5 speaker to hack IoT devices, smartphones, automobiles

Tech Republic Security

Cybersecurity researchers from the University of Michigan used sound waves to trick accelerometers and gain backdoor access into systems.

IoT 121
article thumbnail

How does the enterprise respond to increased security threats? Crosstraining

Tech Republic Security

Lots of IT professionals crosstrained and certified in cybersecurity last year, but that raises a question: Are people seeking out cybersecurity or are they being drafted into the role?

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why businesses are becoming less concerned about cloud security

Tech Republic Security

Lynn Lucas, CMO of Veritas Technologies, spoke with TechRepublic about how businesses are trying to get to the cloud quickly, and find new ways to manage their data in the cloud.

article thumbnail

The top issues your company needs to consider before implementing file-sharing services

Tech Republic Security

Egnyte's Ronen Vengosh spoke with TechRepublic about why companies need to understand their use case and goals, and consider policy enforcement in file sharing.

61
article thumbnail

Weekend reading: Friday, March 17, 2017

Andrew Hay

We’re back with this week’s edition of “Weekend Reading.” Below are some of the data stories from this week that you just can’t miss. I know that I found each of them beneficial (and equally … The post Weekend reading: Friday, March 17, 2017 appeared first on DataGravity Blog.

article thumbnail

New technique claims '100% protection' against internet cyberattacks

Tech Republic Security

Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.

Internet 138
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.