Sat.Jan 21, 2017 - Fri.Jan 27, 2017

article thumbnail

Android users beware: New AI can crack your Pattern Lock from afar

Tech Republic Security

New research from a group of universities found that specific video and computer vision algorithm software can unlock an Android Pattern Lock in five attempts.

Software 158
article thumbnail

NCS Blog: DevOps and Separation of Duties

The Falcon's View

From my NCS blog post : Despite the rapid growth of DevOps practices throughout various industries, there still seems to be a fair amount of trepidation, particularly among security practitioners and auditors. One of the first concerns that pops up is a blurted out "You can't do DevOps here! It violates separation of duties!" Interestingly, this assertion is generally incorrect and derives from a general misunderstanding about DevOps, automation, and the continuous integration/deployment (CI/CD)

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloud-to-Cloud Backup for Dummies

Spinone

Have you ever worked on a production facility? If you have than you know that there is a strict dress code. If not, then let me give you a little sneak peak. You need to wear specific black shoes that weigh a lot and by the end of the day you feel like you have been working out. You need to wear protection glasses, cover your head with a helmet and, most likely, use earplugs.

Backups 40
article thumbnail

How to use Zarp for penetration testing

Tech Republic Security

Network or systems administrators must conduct pen testing to discover any possible security weaknesses. Find out why Zarp is a very powerful pen-testing tool to have at your disposal.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Deceptive networking lures hackers with decoy data

Tech Republic Security

Deception technology, derived from military and intelligence agencies, is a method of planting decoy endpoints to confuse and slow down attackers. Then you can turn the tables in your favor.

article thumbnail

Dropbox bug sends years-old deleted files back to user accounts

Tech Republic Security

A recently discovered bug affecting cloud company Dropbox resulted in data that was supposedly deleted years ago being restored back to user accounts.

More Trending

article thumbnail

Why Cyborg Essentials should be your penetration testing platform

Tech Republic Security

Penetration testing is essential for knowing where your network and systems are weak. Jack Wallen says the right tool for that task is the Debian-based Cyborg Essentials.

article thumbnail

How to set up two-factor authentication on your Microsoft account

Tech Republic Security

If you use a Microsoft account for work, school, or for Xbox Live this extra layer of security is a must-have. Added bonus: It's super simple to activate.

article thumbnail

Top 10 companies hiring cybersecurity professionals

Tech Republic Security

Apple, General Motors, and Capital One are among the top-rated companies for employee experience with several cybersecurity jobs currently open.

article thumbnail

Forrester: What can we learn from a disastrous year of hacks and breaches?

Tech Republic Security

2016 may go down on record as one of the worst for cybersecurity. Hacks, breaches, and leaks were everywhere in the news. Forrester has a few things for us to remember going forward.

Hacking 104
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Apple iPhone 7 is being hardened to handle military-grade secrets

Tech Republic Security

iPhone chosen over a Android handset to be turned into "dual-persona" device that can be used to discuss confidential matters.

120
120
article thumbnail

How to encrypt VirtualBox VMs

Tech Republic Security

If you want to add an extra layer of protection onto your virtual machines and you're using VirtualBox, encrypting those VMs is very simple. Here's how.

article thumbnail

How to enable two-factor authentication for your Twitter account

Tech Republic Security

Do you use Twitter personally or professionally? Then you need to enable two-factor authentication to truly secure your tweets.

article thumbnail

Why it's time to stop blaming open source for ransomware attacks

Tech Republic Security

Open source may help to make software popular, but it is not making it less secure. Here's why.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

President Trump using unsecured Android phone in office, report says

Tech Republic Security

A recent New York Times report claims that US President Donald Trump is still using his old Samsung Galaxy phone, despite previous reports that he gave it up in favor of a secured device.

123
123