Sat.Jun 03, 2017 - Fri.Jun 09, 2017

article thumbnail

Microsoft: Windows 10 S not affected by any 'known ransomware'

Tech Republic Security

In a blog post, Microsoft called Windows 10 S its "latest and most hardened operating system," and explained how it protects users against ransomware and other threats.

article thumbnail

What’s It Like to Join a Startup’s Executive Team?

Lenny Zeltser

Startups are the innovation engine of the high-tech industry. Those who’ve participated in them have experienced the thrill and at times the disappointment of navigating uncharted territories of new ideas. Others have benefited from the fruits of these risk-takers’ labor by using the products they created. What’s it like to contribute at an early stage of a startup?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CASL Private Right of Action Delayed (Indefinitely)

Privacy and Cybersecurity Law

The Government of Canada has repealed the coming into force of the private right of action for violations of Canada’s Anti-Spam Legislation (CASL). The Government has listened to concerns raised by businesses, charities and the not-for-profit sector about the implementation of CASL, which would have permitted individuals to sue for violations of the law.

article thumbnail

Cybersecurity researchers claim every network router at risk of secretly leaking data

Tech Republic Security

Researchers at Ben-Gurion University of the Negev recently demonstrated a hacking technique that utilizes a router's LED to transmit sensitive information.

Risk 148
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Report: 10 trends in application security that will impact your cyberdefense strategy

Tech Republic Security

At Infosecurity Europe 2017, High-Tech Bridge reported on the latest cybersecurity trends, touching on mobile and IoT security, DevSecOps, Bug Bounties, OWASP Top Ten and encryption.

IoT 137
article thumbnail

Why ransomware attacks are making Bitcoin more expensive for everyone

Tech Republic Security

At the Corporate Governance conference in New York, Citrix CEO Kirill Tatarinov said that businesses were hoarding Bitcoin to pay off ransomware attacks.

More Trending

article thumbnail

Apple Pay: The smart person's guide

Tech Republic Security

Apple Pay is a mobile payment solution that's accepted by millions of retailers in various countries. This guide covers what you need to know to use Apple Pay.

Retail 133
article thumbnail

The ransomware debate: Should you pay to get your data back?

Tech Republic Security

As ransomware continues to grow exponentially, more and more users and corporations are being affected and finding themselves at a crossroad: To pay or not to pay?

article thumbnail

Raspberry Pi owners: Update your Pi to protect against this Linux trojan

Tech Republic Security

The Linux.MulDrop.14 trojan specifically targets Raspberry Pi devices running older versions of the official Raspbian OS.

139
139
article thumbnail

How to patch Red Hat systems against SambaCry

Tech Republic Security

The SambaCry vulnerability has the potential to impact Red Hat Enterprise Linux versions 5-7. Learn how to mitigate this threat in a Red Hat environment.

117
117
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

3 simple steps that help you avoid ransomware on Android

Tech Republic Security

If you're concerned about ransomware or other malicious bits getting onto your Android device, Jack Wallen offers up three things you can do to help protect your mobile experience from attack.

article thumbnail

Tech companies should allow police to access encrypted data, former US intelligence director says

Tech Republic Security

Tech companies should develop encryption methods that protect privacy, but also allow authorities access to content when crime is involved, James Clapper told the National Press Club on Wednesday.

article thumbnail

HPE debuts 'world's most secure servers' and new compute experience at Discover

Tech Republic Security

At the HPE Discover conference in Las Vegas, HPE unveiled its new Gen 10 ProLiant servers and a new compute experience for enterprise IT.

101
101
article thumbnail

Windows XP refuses to die, but Windows 10 adoption is slowly gathering pace

Tech Republic Security

The proportion of PCs used by healthcare bodies running Windows XP has increased, according to new report.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Can edutainment videos prevent the next WannaCry?

Tech Republic Security

Researchers are busy exploring why software vulnerabilities still exist, as well as creative ways to change users' attitudes about cybersecurity.

article thumbnail

Video: Raspberry Pi boards forced to mine cryptocurrency by Linux trojan

Tech Republic Security

Those running new Pi boards or who have updated to latest version of the default Raspbian OS should be protected.

article thumbnail

3 ways to avoid ransomware on Android

Tech Republic Security

Don't let your device fall prey to ransomware. Follow these easy tips.