Sat.Nov 12, 2016 - Fri.Nov 18, 2016

article thumbnail

Apple encryption war continues: NY DA requests 400 iPhones be unlocked

Tech Republic Security

The New York district attorney recently released a report calling for smartphone manufacturers to create operating systems that allow them to more easily access user data.

article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Trends for 2017

Spinone

Information Technology research and advisory company, Gartner, presented its top predictions for the cybersecurity industry for 2017 earlier this year. With the number of data breaches and cybersecurity attacks growing every year , it’s becoming increasingly important for businesses of any size to think seriously about their digital security policies and plans.

article thumbnail

66% of organizations won't recover after cyberattack, study says

Tech Republic Security

IBM and the Ponemon Institute's 2016 Cyber Resilient Organization study found that cyber resilience among enterprise organizations is dropping.

168
168
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

3 tips to reducing big data compliance risks

Tech Republic Security

Don't let big data compliance risks take you by surprise. Here are three steps to take today to ease your big data compliance concerns.

Big data 167
article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 167

LifeWorks

More Trending

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

168
168
article thumbnail

Despite privacy concerns, Microsoft calls Windows 10 'the most secure version of Windows'

Tech Republic Security

Microsoft recently penned a blog post explaining some of the security updates in the Windows 10 Anniversary Edition, especially dealing with protecting against ransomware.

article thumbnail

Worried about Windows 10 snooping? Here's how you can stop it

Tech Republic Security

Attempts to stem the quantity of data that Windows 10 gathers on users continue to this day. Here are the options available if you're uncomfortable with how much data the OS hoovers up.

167
167
article thumbnail

Massive DDoS attacks up 138% from last year, says Akamai report

Tech Republic Security

Akamai recently released its State of the Internet and Security Report for Q3 2016, detailing the rise of certain threats and the overall security landscape.

DDOS 167
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

How to secure your Apache 2 server in four steps

Tech Republic Security

If you're concerned about the security of your Apache server, these four tips will go a long way to keeping that system secure.

167
167
article thumbnail

How to fix the Cryptsetup vulnerability in Linux

Tech Republic Security

A new vulnerability has been found to affect encrypted Debian and Ubuntu systems. Here's how to put a temporary fix on the Cryptsetup issue.

article thumbnail

How hackers steal EHR data and sell it on the Dark Web

Tech Republic Security

Intel researchers looked into how hackers steal electronic health records (EHR) databases and discovered EHR data on the Dark Web, but there's still one big unanswered question about EHR theft.

162
162
article thumbnail

Samsung makes $8B bet on connected car market with purchase of Harman International

Tech Republic Security

The cash purchase marks Samsung's biggest move into the connected cars space yet, and will give the company new inroads in IoT and connectivity.

Marketing 155
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Encryption key standard getting a makeover and EMC endorsement

Tech Republic Security

Key Management Interoperability Protocol is an obscure yet important 6-year-old encryption standard. Its leaders are looking for a big boost in 2017.

article thumbnail

Windows 10: Microsoft faces Russian probe over claim it pushes Windows Defender on users

Tech Republic Security

Russian competition authority investigates whether Windows 10 gives Microsoft an "unreasonable advantage" in the security software market.

Marketing 151
article thumbnail

New security solution from Dell aims to protect data across entire lifecycle

Tech Republic Security

Dell recently unveiled its Dell Data Protection | Secure Lifecycle product, which protects data at-rest and in-transit, both inside and outside of the corporate network.

148
148
article thumbnail

[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads

Scary Beasts Security

Overview A confluence of two risky design choices, combined with various implementation issues, makes drive-by downloads possible with Google Chrome on Fedora. In total, with the risky design choices first, the issues are: Chrome will auto download files to a user’s desktop with no confirmation. Fedora’s “tracker” software will auto crawl downloaded files to index them, including media files.

Media 75
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.