Sat.Oct 15, 2016 - Fri.Oct 21, 2016

article thumbnail

IBM and SBI Securities test bond trading on the blockchain

Tech Republic Security

SBI Securities will adopt the Hyperledger Fabric and work with IBM to test the application of blockchain technology for operational processes and security around bond trading.

article thumbnail

Full(er) House: Exposing high-end poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Social Engineering – The Mental Game, Part I.

NopSec

The first thing that all organizations need to understand is why social engineering works. In many cases organizations, security professionals, and people understand what the attacks are, phishing, physical impersonations, etc. But why does this work and why is it so successful when it is used? In its simplest form, social engineering is an attack that focuses on the human element in the security context.

article thumbnail

Zero in on IT security risks by applying the 80/20 rule to vulnerability assessments

Tech Republic Security

It is impossible to defend everything; the Pareto Principle, also known as the 80/20 rule, is one way for IT security pros to determine what's most important to protect.

Risk 164
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to use Apple Configurator 2 to simplify deploying iOS upgrades OTA

Tech Republic Security

Follow these steps to create a configuration file in Apple Configurator 2 that you can deploy to end users or push via MDM to manage settings on devices over-the-air (OTA).

156
156
article thumbnail

October is National Cyber Security Awareness Month: How secure is your enterprise?

Tech Republic Security

It's National Cyber Security Awareness Month. Enterprises of all sizes should take time to educate their workforce on lurking cyber security threats.

More Trending

article thumbnail

How banks fight back against cyberattacks

Tech Republic Security

Financial services companies are lucrative targets for hackers. Cybersecurity risk management expert Ertem Osmanoglu explains what data hackers are after and how companies should respond to attacks.

Banking 131
article thumbnail

MIT students and others to teach IBM Watson about cybersecurity

Tech Republic Security

Enterprise IT risks are growing seemingly faster than security professionals can keep up. Enter artificial intelligence as their latest defense mechanism.

article thumbnail

Millennials most likely to lose money from tech support scams, says Microsoft

Tech Republic Security

A new report from Microsoft details the victim demographics of tech support scams, and some of the findings may surprise you.

Scams 156
article thumbnail

3D printing hack: Researchers crash drone with sabotaged propeller

Tech Republic Security

Researchers from three universities recently completed an attack on a 3D additive manufacturing system, highlighting the impact of potential security vulnerabilities in such systems.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

US police storing facial image data of 117 million Americans, report says

Tech Republic Security

26 states now let law enforcement use face recognition tech to search driver's license and ID photos, creating a "virtual line-up" of residents.

140
140
article thumbnail

How to manage user security in Samba

Tech Republic Security

When securing your Samba shares, start by locking down user and group security. Follow this tutorial to learn how.

140
140
article thumbnail

Five essential cybersecurity podcasts for IT professionals

Tech Republic Security

A curated list of cybersecurity podcasts to help security experts and enthusiasts stay on top of emerging threats.

article thumbnail

Microsoft custom tailors Office 365 and Azure cloud for Department of Defense

Tech Republic Security

Microsoft recently updated its Government Cloud with two new regions, custom versions of Office 365 and Azure, and DoD Impact Level 5 readiness.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

GoDaddy ups security with email encryption and archiving for Office 365 users

Tech Republic Security

GoDaddy recently announced that they were offering specific new security features for their customers who use Office 365.

article thumbnail

Predicting Hearthstone game outcome with machine learning

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.