Sat.Apr 08, 2017 - Fri.Apr 14, 2017

article thumbnail

5 ways robots are vulnerable to cyberattacks

Tech Republic Security

Robotic devices flooding the IoT market are insecure, according to IOActive researchers. Authentication and privacy issues are some of the cybersecurity risks the researchers found.

IoT 157
article thumbnail

ICO request feedback on profiling and automated decision-making

Privacy and Cybersecurity Law

The ICO has published a request for feedback on the GDPR rules on profiling and automated decision making. They say […].

52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Construction Haikus—Contest of Unique Content—Winner is Forthcoming

Dark Reading

Recently we ask Dexter + Chaney clients to channel their inner creativity and create construction haikus. Each year, towards the end of April, Dexter + Chaney hosts our annual user conference, Connect 2017 in downtown Seattle. At this year's conference we will be announcing the first ever Dexter + Chaney Construction Poet Laureate.

45
article thumbnail

Why Performance Reviews Are Critical for Small Businesses

Schneier on Security

Some of the key hallmarks of small businesses are their entrepreneurship, their adaptability, and their nimbleness. Often times, these important characteristics lead owners and managers to decide that a traditional performance review process doesn’t fit with their small business’ culture. After all, the standard model of performance reviews can seem archaic and more well-suited to regimented large corporations rather than flexible small businesses.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

6 common enterprise cybersecurity threats and how to avoid them

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained how to protect your company from threats such as ransomware, phishing, and IoT vulnerabilities.

IoT 148
article thumbnail

3 Dangerous Myths About DDoS Attacks

NopSec

Distributed denial of service (DDoS) attacks are a growing but frequently misunderstood threat in the cybersecurity world. Defined generally, a DDoS attack occurs when an adversary directs traffic that is either large in volume or ill-formed against a service in order to render that service unavailable to legitimate users. Today, we seek to combat a few common myths about DDoS attacks that may be standing in the way of organizations’ ability to effectively mitigate these threats.

DDOS 40

More Trending

article thumbnail

What kinds of people fall prey to identity theft, phishing, and hacks? It's not who you think

Tech Republic Security

Think of an identity theft victim and a few stereotypes probably come to mind, but a new study from CBT Nuggets reveals that the majority of victims are anything but stereotypical.

article thumbnail

5 tips for securing your Docker containers

Tech Republic Security

Once you start making use of Docker, you'll want to consider the security of your server and containers. Her are five tips to help you gain a bit more security with your containers.

126
126
article thumbnail

Artificial data reduces privacy concerns and helps with big data analysis

Tech Republic Security

MIT researchers can create fake data sets from real ones, allowing data analysis without concern for sensitive personal information becoming public.

Big data 134
article thumbnail

Android Security Bulletin April 2017: What you need to know

Tech Republic Security

The April 2017 Android Security Bulletin turned out to be yet another month with the platform once again topping its previous number of critical flaws. Get the highlights.

122
122
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Research shows smartphone fingerprint scanners aren't as secure as we think they are

Tech Republic Security

Researchers from two universities were able to spoof some fingerprint-based security systems, demonstrating the possibility of creating a master print to unlock phones.

115
115
article thumbnail

'Critical' Microsoft Office hack uses fake Word documents to install malware

Tech Republic Security

A new exploit, reported by McAfee, uses trick Microsoft office files to install malware on a user's machine and can bypass existing protection methods.

Malware 122
article thumbnail

Uber accused of using 'Hell' software program for industrial espionage against Lyft

Tech Republic Security

Uber has been quietly tracking the locations of Lyft drivers, how many Lyft drivers work for Uber, and more, according to a report by The Information.

Software 114
article thumbnail

Mobile devices with Broadcom chipsets may be vulnerable to Wi-Fi hijacking

Tech Republic Security

Learn about new developments to a Wi-Fi vulnerability and how to protect mobile devices from it.

Mobile 136
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

How to secure your Internet of Things

Tech Republic Security

The Internet of Things is a security nightmare. Here are a few ways to protect your devices and data.

Internet 101
article thumbnail

Video: How to avoid cybersecurity incidents when building a global system

Tech Republic Security

At the 2017 Midmarket CIO Forum, Jeff Young of Haynes International explains the challenges in creating a global ERP after winning the Midmarket CIO Award.

article thumbnail

Video: How to protect your company from cybercrime

Tech Republic Security

At the 2017 Midmarket CIO Forum, Brian Hill of Computer Forensic Services explained the biggest cyber threats facing the enterprise, and how CIOs can keep their organization safe.

article thumbnail

Why employees in Sweden are opting to be implanted with NFC-enabled microchips

Tech Republic Security

A Swedish company called Epicenter is giving employees the option to be implanted with rice-size chips that use a magnetic field to transfer data.

67
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video: Go cyber-threat hunting with an enterprise malware expert

Tech Republic Security

Infocyte founder and former Air Force cybersecurity expert Chris Gerritz explains why every company needs a proactive digital defense plan.