Sat.Jun 24, 2017 - Fri.Jun 30, 2017

article thumbnail

Ukraine is a test bed for global cyberattacks that will target major infrastructure

Tech Republic Security

On the ground in Kiev, TechRepublic got a first-hand look at the frontline of a cyberwar that involves alleged Russian state-sponsored hackers, organized crime, and lone-wolf attackers.

166
166
article thumbnail

Kali Drones, Portable CTF Builds, Raspberry Pi Craziness and More!

Kali Linux

The Kali community is a pretty crazy thing. There are folks all over the world doing interesting things with Kali Linux and far too often, these cool projects get overlooked. Part of the problem is that the community is spread out all over the ’net. We’re continuing to help build the Kali community to help with this problem, but that’s a slightly longer topic.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why ForAllSecure Is On MIT Technology Review's 2017 List Of Smartest Companies

ForAllSecure

I am honored to share that ForAllSecure has been named to MIT Technology Review’s 2017 list of 50 Smartest Companies. According to the MIT Tech Review team, to make the list, a company must exhibit technological leadership and business acumen, which set them apart from competitors. Nanette Byrnes, senior editor for MIT Tech Review business shared: “Public and private, large and small, based in countries around the globe, this group of companies is creating new opportunities and pounc

article thumbnail

Petya Ransomware: What You Need to Know and Do

Andrew Hay

By: Andrew Hay. Unless you’ve been away from the Internet earlier this week, you’ve no doubt heard by now about the global ransomware outbreak that started in Ukraine and subsequently spread West across Western Europe, North America, and Australia yesterday. With similarities reminiscent to its predecessor WannaCry, this ransomware attack shut down organizations ranging from the Danish shipping conglomerate Maersk Line to a Tasmanian-based Cadbury chocolate factory.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The next generation of cybersecurity professionals is being created by the Girl Scouts

Tech Republic Security

Girl Scouts of the USA is rolling out a set of 18 new cybersecurity badges next year, to teach young women in grades K-12 programming, ethical hacking, and identity theft prevention.

article thumbnail

The True Cost of A Great Penetration Test

NopSec

If you asked car salesmen from different dealerships the question, “How much does a great car cost?” you’re guaranteed to get different answers and rarely any consistent dollar amount, depending on who they are and the type of person they perceive you to be. “Never buy used American cars. Get Japanese ones. We have some in the lot. Cheap, but it works.

More Trending

article thumbnail

The world needs more cybersecurity pros, but millennials aren't interested in the field

Tech Republic Security

Only 7% of cybersecurity workers are under age 29, and just 11% are women. Here's how your business can better recruit younger, more diverse cybersecurity workers.

article thumbnail

Report: 37% of adults at 'serious risk' of being hacked through their IoT devices

Tech Republic Security

Fitness trackers, smart TVs, and children's toys are extremely vulnerable to cyberattacks, but consumers don't know how to protect them, according to a new report from BullGuard.

IoT 148
article thumbnail

Report: 2.5 million people fell victim to ransomware last year, up 11% from 2016

Tech Republic Security

Ransomware attacks continue to rise worldwide, with the US experiencing the most mobile ransomware threats in the past year, according to a new report from Kaspersky Lab.

article thumbnail

iOS and Android security: A timeline of the highlights and the lowlights

Tech Republic Security

iOS and Android security has evolved from nice to have in the platforms' early days to essential. Here's an overview of iOS and Android security features, attacks, and patches through the years.

142
142
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to deter hackers: Follow these digital safety best practices

Tech Republic Security

Nothing guarantees perfect online security. But these checklists will help lock down and protect your digital life, keeping you one step ahead of the bad guys.

148
148
article thumbnail

10 tips to help reduce user account lockouts and password resets

Tech Republic Security

User account administration can waste a lot of precious time and effort, on everyone's part. Here are 10 tips, five for users and five for admins, to reduce the hassle.

article thumbnail

6 tips to avoid ransomware after Petya and WannaCry

Tech Republic Security

Ransomware attacks continue to wreak havoc on businesses worldwide. Here are six recommendations from PwC to prevent and mitigate these cybercrimes.

article thumbnail

Most IoT devices are an attack waiting to happen, unless manufacturers update their kernels

Tech Republic Security

The security of IoT devices rests squarely on the shoulders of manufacturers. Jack Wallen explains and offers up the one solution that could go a long way to securing IoT.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Windows 10 snooping: Microsoft has halved data it collects from PCs says watchdog

Tech Republic Security

The French regulator CNIL announced that Windows 10 now complies with the country's data protection laws, following changes to how the OS handles user privacy.

130
130
article thumbnail

How the GoldenEye/Petya ransomware attack reveals the sorry state of cybersecurity

Tech Republic Security

The latest global ransomware outbreak has rapidly affected governments and organizations around the world. The worst part? We should have known better.

article thumbnail

Video: Inside the Kiev startup scene

Tech Republic Security

Igor Ovcharenko, Business Developer at Geneva-based Seedstars, explains why entrepreneurs from tech companies around the world are coming to Ukraine to start new, innovative companies

118
118
article thumbnail

Contractors lose jobs after hacking CIA's in-house vending machines

Tech Republic Security

There is some irony in that CIA vending machines were hacked, especially when there may be more at stake than the machines' contents.

Hacking 136
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Windows 10 adds end-to-end security to the Fall Creators Update

Tech Republic Security

Microsoft is ramping up Windows 10 security features, using cloud intelligence to better detect and respond to attacks. Here's how it could help your enterprise.

122
122
article thumbnail

Cisco Live 2017: Chuck Robbins discusses networking, security and the acceleration of the Apple partnership

Tech Republic Security

Chuck Robbins, CEO of Cisco, sat down with TechRepublic Senior Writer Teena Maddox in an exclusive interview to discuss Cisco's partnership with Apple, the new era of networking, and security.

article thumbnail

Fileless malware: The smart person's guide

Tech Republic Security

Fileless malware uses system files and functions native to the operating systems to evade detection and deliver its payload. Learn more about this invisible threat and the best approach to combat it.

Malware 104
article thumbnail

Video: Why machine learning for defensive cybersecurity is a good idea

Tech Republic Security

Mathematician Miranda Mowbray explains how machine learning - the application of statistics to decision problems - can help organizations defend against large scale threats.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

How to get private encrypted notes with Standard Notes

Tech Republic Security

If you're looking for a cloud-based note taking tool that offers solid encryption and ease of use, Standard Notes could be exactly what you need.

article thumbnail

Free security solution will block malware, zero-day attacks

Tech Republic Security

Cybersecurity provider Comodo is offering a new endpoint detection and response solution free to enterprise users.

Malware 119
article thumbnail

US to head off laptop ban on international flights with revised security requirements

Tech Republic Security

New security measures for certain foreign flights to the US will stop the ban on large electronics from expanding, according to new reports.

105
105
article thumbnail

Ransomware attacks: Here's what we need to learn from WannaCry and Petya

Tech Republic Security

Ransomware is here to stay, which means it's time to make a few changes to how we respond.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.

article thumbnail

Petya ransomware: Where it comes from and how to protect yourself

Tech Republic Security

The attack highlights the growing danger of compromised third-party software being used to spread malware throughout firms.

article thumbnail

How Cisco will help Apple keep its iOS devices secure

Tech Republic Security

At Cisco Live 2017, CEO Chuck Robbins discussed how Cisco is addressing security at the network layer, and integrating this into Apple devices to provide higher levels of security for enterprise users.

84
article thumbnail

Report: Twice as many IT professionals plan to build formal security teams in 2017

Tech Republic Security

A survey of security professionals reveals that more enterprises are preparing for breaches as attacks increase. Here are 8 takeaways.

98
article thumbnail

Global Cybersecurity Summit 2017: Are cybersecurity dollars being spent effectively?

Tech Republic Security

A panel of experts at the Global Cybersecurity Summit in Kiev, Ukraine discuss where to allocate the billions of dollars spent on cybersecurity.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

A well-defined change management process is critical to minimizing the impact that change has on your organization. Leveraging the data that your ERM program already contains is an effective way to help create and manage the overall change management process within your organization. Your ERM program generally assesses and maintains detailed information related to strategy, operations, and the remediation plans needed to mitigate the impact on the organization.