Sat.Nov 19, 2016 - Fri.Nov 25, 2016

article thumbnail

NFL Wi-Fi, cyberwar training, and hacking diabetes care: TechRepublic's cover stories of 2016

Tech Republic Security

We work hard to provide in-depth investigative tech journalism. Here's what we've reported in 2016.

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Announces New Guidance on Ransomware

Privacy and Cybersecurity Law

On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact […].

article thumbnail

Cloud Computing Trends in 2016

Spinone

As more and more companies move to cloud services to increase productivity and reduce costs, we are seeing a shift in how businesses are working with digital technologies and their needs and requirements are also changing to fit these new ways of working. The adoption of cloud computing for storage and other services continues to grow, and with it comes new concerns about security and privacy.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Windows 10 snooping: Microsoft gets more time to tackle 'excessive' data collection

Tech Republic Security

Microsoft has been granted more time to change how Windows 10 collects data about users in order to comply with the French data protection act.

article thumbnail

[0day] [PoC] Incorrect fix for gstreamer FLIC decoder vulnerability CESA-2016-0004

Scary Beasts Security

Overview Recently (Nov 21st, 2016), I published an 0day exploit against the gstreamer FLIC decoder, here on my blog. The response time from gstreamer upstream was impressive: a patch in 1 day or so that fixed not only the immediate issue but also some similar bugs in other functions in the decoder. More on those other bugs in another post. Here is the git commit.

LifeWorks

More Trending

article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

IoT
article thumbnail

Don't let yourself be targeted by cybercriminals: Here are 6 tips for safe holiday shopping

Tech Republic Security

Online shopping is easy and convenient, and more people are doing it than ever before. The rise in e-commerce also gives cybercriminals more opportunities to rob you blind. Here's how to stay safe.

article thumbnail

Tweets aren't tools for surveillance: Twitter pushes back against law enforcement

Tech Republic Security

In a recent blog post, the social media company clarified the acceptable use of its public APIs, pushing back against tweets being used to track protesters and activists.

article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How analytics plays an important role in software IP theft cases

Tech Republic Security

Discover how software analytics tools help lawyers and courts determine whether software infringement cases have merit.

article thumbnail

How enterprise companies can raise internal cyber-risk awareness

Tech Republic Security

Cisco's Senior Director of Security and Trust explains the high stakes of enterprise security, the next wave of corporate cyber-attacks, and best practices for raising risk awareness.

article thumbnail

How to install a text-based password manager for Linux, Mac, or FreeBSD users

Tech Republic Security

If you want a password manager tool that will work without a GUI, here's a solution that you shouldn't pass on.

article thumbnail

NIST and USCG Issue New Maritime Industry Cybersecurity Profile

Privacy and Cybersecurity Law

In 2013, President Obama issued Executive Order 13636 and directed the Director of the National Institute of Standards and Technology […].

article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.