Sat.Nov 12, 2016 - Fri.Nov 18, 2016

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

167
167
article thumbnail

[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads

Scary Beasts Security

Overview A confluence of two risky design choices, combined with various implementation issues, makes drive-by downloads possible with Google Chrome on Fedora. In total, with the risky design choices first, the issues are: Chrome will auto download files to a user’s desktop with no confirmation. Fedora’s “tracker” software will auto crawl downloaded files to index them, including media files.

Media 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Trends for 2017

Spinone

Information Technology research and advisory company, Gartner, presented its top predictions for the cybersecurity industry for 2017 earlier this year. With the number of data breaches and cybersecurity attacks growing every year , it’s becoming increasingly important for businesses of any size to think seriously about their digital security policies and plans.

article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Risk 167
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 156
article thumbnail

Apple encryption war continues: NY DA requests 400 iPhones be unlocked

Tech Republic Security

The New York district attorney recently released a report calling for smartphone manufacturers to create operating systems that allow them to more easily access user data.

More Trending

article thumbnail

Worried about Windows 10 snooping? Here's how you can stop it

Tech Republic Security

Attempts to stem the quantity of data that Windows 10 gathers on users continue to this day. Here are the options available if you're uncomfortable with how much data the OS hoovers up.

152
152
article thumbnail

66% of organizations won't recover after cyberattack, study says

Tech Republic Security

IBM and the Ponemon Institute's 2016 Cyber Resilient Organization study found that cyber resilience among enterprise organizations is dropping.

166
166
article thumbnail

How to secure your Apache 2 server in four steps

Tech Republic Security

If you're concerned about the security of your Apache server, these four tips will go a long way to keeping that system secure.

163
163
article thumbnail

3 tips to reducing big data compliance risks

Tech Republic Security

Don't let big data compliance risks take you by surprise. Here are three steps to take today to ease your big data compliance concerns.

Big data 156
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Massive DDoS attacks up 138% from last year, says Akamai report

Tech Republic Security

Akamai recently released its State of the Internet and Security Report for Q3 2016, detailing the rise of certain threats and the overall security landscape.

DDOS 144
article thumbnail

How hackers steal EHR data and sell it on the Dark Web

Tech Republic Security

Intel researchers looked into how hackers steal electronic health records (EHR) databases and discovered EHR data on the Dark Web, but there's still one big unanswered question about EHR theft.

133
133
article thumbnail

How to fix the Cryptsetup vulnerability in Linux

Tech Republic Security

A new vulnerability has been found to affect encrypted Debian and Ubuntu systems. Here's how to put a temporary fix on the Cryptsetup issue.

article thumbnail

New security solution from Dell aims to protect data across entire lifecycle

Tech Republic Security

Dell recently unveiled its Dell Data Protection | Secure Lifecycle product, which protects data at-rest and in-transit, both inside and outside of the corporate network.

122
122
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Encryption key standard getting a makeover and EMC endorsement

Tech Republic Security

Key Management Interoperability Protocol is an obscure yet important 6-year-old encryption standard. Its leaders are looking for a big boost in 2017.

article thumbnail

Samsung makes $8B bet on connected car market with purchase of Harman International

Tech Republic Security

The cash purchase marks Samsung's biggest move into the connected cars space yet, and will give the company new inroads in IoT and connectivity.

Marketing 126
article thumbnail

Windows 10: Microsoft faces Russian probe over claim it pushes Windows Defender on users

Tech Republic Security

Russian competition authority investigates whether Windows 10 gives Microsoft an "unreasonable advantage" in the security software market.

Marketing 124
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?