Sat.Nov 19, 2016 - Fri.Nov 25, 2016

article thumbnail

Don't let yourself be targeted by cybercriminals: Here are 6 tips for safe holiday shopping

Tech Republic Security

Online shopping is easy and convenient, and more people are doing it than ever before. The rise in e-commerce also gives cybercriminals more opportunities to rob you blind. Here's how to stay safe.

167
167
article thumbnail

[0day] [PoC] Incorrect fix for gstreamer FLIC decoder vulnerability CESA-2016-0004

Scary Beasts Security

Overview Recently (Nov 21st, 2016), I published an 0day exploit against the gstreamer FLIC decoder, here on my blog. The response time from gstreamer upstream was impressive: a patch in 1 day or so that fixed not only the immediate issue but also some similar bugs in other functions in the decoder. More on those other bugs in another post. Here is the git commit.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud Computing Trends in 2016

Spinone

As more and more companies move to cloud services to increase productivity and reduce costs, we are seeing a shift in how businesses are working with digital technologies and their needs and requirements are also changing to fit these new ways of working. The adoption of cloud computing for storage and other services continues to grow, and with it comes new concerns about security and privacy.

article thumbnail

NIST and USCG Issue New Maritime Industry Cybersecurity Profile

Privacy and Cybersecurity Law

In 2013, President Obama issued Executive Order 13636 and directed the Director of the National Institute of Standards and Technology […].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

Media 101

More Trending

article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

IoT 167
article thumbnail

Windows 10 snooping: Microsoft gets more time to tackle 'excessive' data collection

Tech Republic Security

Microsoft has been granted more time to change how Windows 10 collects data about users in order to comply with the French data protection act.

article thumbnail

How enterprise companies can raise internal cyber-risk awareness

Tech Republic Security

Cisco's Senior Director of Security and Trust explains the high stakes of enterprise security, the next wave of corporate cyber-attacks, and best practices for raising risk awareness.

article thumbnail

NFL Wi-Fi, cyberwar training, and hacking diabetes care: TechRepublic's cover stories of 2016

Tech Republic Security

We work hard to provide in-depth investigative tech journalism. Here's what we've reported in 2016.

Hacking 167
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How analytics plays an important role in software IP theft cases

Tech Republic Security

Discover how software analytics tools help lawyers and courts determine whether software infringement cases have merit.

Software 149
article thumbnail

How to install a text-based password manager for Linux, Mac, or FreeBSD users

Tech Republic Security

If you want a password manager tool that will work without a GUI, here's a solution that you shouldn't pass on.

article thumbnail

FTC Announces New Guidance on Ransomware

Privacy and Cybersecurity Law

On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact […].

article thumbnail

Internet of Things (IoT) Security Takes Center Stage At FBI, DHS, NIST and Congress

Privacy and Cybersecurity Law

On October 21, 2016, a domain name service host and internet management company experienced at least two waves of a […].

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.