September, 2016

article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

IoT 167
article thumbnail

Azure Marketplace, Weekly ISO Builds

Kali Linux

Kali Linux in the Azure Marketplace Over the past couple of weeks we’ve been working on building and implementing Kali 2016.2 in the Azure Marketplace. We’re happy to announce that from today on, you can spin up a Kali machine from the Azure Marketplace. In just a few seconds, you can have a full penetration testing toolset at your fingertips for no additional cost (other than the standard Azure pricing).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six Effective Ransomware Risk Reduction Strategies

NopSec

Businesses, governments, and consumers alike need to be aware of ransomware – a type of malware that can inflict serious damage on your finances and productivity in a very short span of time. Today, we explain this category of malware: how it works, the risks it poses to your organization, and strategies for preventing an attack. How Ransomware Works Ransomware is a type of malware that deliberately interferes with the standard operation of a computer until a ransom is paid.

article thumbnail

New York Proposes First-in-the-Nation Cybersecurity Regulation for Financial Institutions

Privacy and Cybersecurity Law

On September 13, 2016, the New York Department of Financial Services introduced a new rule that would require banks, insurance […].

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

No More Ransom takes a bite out of ransomware

Tech Republic Security

No More Ransom is a project with Kaspersky Lab, Intel Security, and two law enforcement agencies to help victims of ransomware understand their options when facing a digital extortion attempt.

More Trending

article thumbnail

The security tsunami of the Internet of Things is coming, are you ready?

Tech Republic Security

Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things.

Internet 159
article thumbnail

Security breaches: How small businesses can avoid a HIPAA lawsuit

Tech Republic Security

The US government recently began investigating smaller healthcare cybersecurity breaches. Here's what it could mean for your business and how you can protect your company.

article thumbnail

Apps vs. mobile websites: Which option offers users more privacy?

Tech Republic Security

Is it better to use a mobile app or the equivalent mobile website when it comes to privacy? Researchers have an answer, and offer a privacy resource that rates 50 free online services.

Mobile 153
article thumbnail

Yahoo confirms 500M accounts leaked in massive data breach

Tech Republic Security

Yahoo recently confirmed that a suspected breach in 2014 affected hundreds of millions of users, and was believed to be carried out by a 'state-sponsored actor.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cybersecurity: Two-thirds of CIOs say threats increasing, cite growth of ransomware

Tech Republic Security

Eight of 12 tech decision makers polled said FBI warnings of ransomware and other cybersecurity attacks are valid, and that threats have increased in the past year.

article thumbnail

Beware: iOS 10 security flaw makes cracking encrypted backups 2,500 times easier

Tech Republic Security

Russian security firm Elcomsoft discovered the flaw, which makes brute force password cracking far easier than in iOS 9. All iPhone and iPad users need to be aware of what's at stake.

Backups 145
article thumbnail

How to install the Yandex.Disk cloud client on Ubuntu

Tech Republic Security

Yandex.Disk is a Dropbox alternative worth checking out. If you'd like to add support for the Yandex.Disk cloud syncing solution to your Ubuntu desktop, read this tutorial.

144
144
article thumbnail

A Pokemon Go guide infected thousands of phones

Tech Republic Security

"There's no surprise that an app as popular as Pokemon Go has spawned associated malware," said Tim Erlin, senior director of IT security and risk strategy for Tripwire.

Malware 142
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Security: It might not be the outside world that's the largest threat to businesses

Tech Republic Security

A new report reveals that one in three businesses experienced an insider attack in the past year. More devices with more access are putting sensitive info in the hands of everyone: Spies included.

138
138
article thumbnail

Malware downloaded every 81 seconds, says new Check Point security report

Tech Republic Security

A new report from Check Point claims that the average day in an enterprise organization is rife with malware and malicious applications.

Malware 158
article thumbnail

How machine learning and AI will 'save the entire security industry'

Tech Republic Security

Machine learning and big data have led to many advances, including some in cybersecurity. Cylance CEO Stuart McClure explained the biggest implications the technology has for security.

Big data 136
article thumbnail

Over 400,000 sensitive healthcare records leaked on the Dark Web

Tech Republic Security

Ransomware is a fast-growing digital threat. Cybersecurity expert Mark Turnage explains how companies large and small can find data on the Dark Web and protect themselves from an attack.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Understanding Android's balance between openness and security

Tech Republic Security

At the 2016 Structure Security conference, Google's Adrian Ludwig talked about the balance between keeping Android as open as possible, while also keeping it secure.

137
137
article thumbnail

What business leaders need to know about the state of cybersecurity

Tech Republic Security

At the 2016 Structure Security conference, Rally Ventures' Art Coviello gave an overview of the threat landscape and provided best practices for security professionals and developers.

article thumbnail

Accenture announces creation of an editable blockchain, but Bitcoin users need not worry

Tech Republic Security

With the help of cryptologist Dr. Giuseppe Ateniese, Accenture has discovered a way to edit blockchains. Bitcoin enthusiasts can relax: It has a completely different use.

133
133
article thumbnail

How quantum computing could unpick encryption to reveal decades of online secrets

Tech Republic Security

The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Report: The top 6 industries hit by ransomware

Tech Republic Security

Education, government, and healthcare top the list of at-risk sectors, according to a new report. Here's what you need to know to protect your company.

article thumbnail

Which political party is more cybersecure?

Tech Republic Security

Cybersecurity expert Tim Bandos reveals which political party is most vulnerable, common hacking techniques, and what companies can learn from watching how the DNC and RNC respond to cyberthreats.

article thumbnail

Enterprise IoT deployment creates a target-rich environment for criminals

Tech Republic Security

Every company involved in IoT knows the systems are insecure--including Microsoft. It is working on platform solutions, but developers have to make a commitment to proactive security.

IoT 125
article thumbnail

Help wanted: How automation can help with the security skills gap

Tech Republic Security

Many tech jobs are going unfilled, and that number is growing in security. Jay Leek, the CISO of Blackstone, explained how CISOs can prepare for the lack of talent in the future.

CISO 118
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Poll: Should Edward Snowden be pardoned?

Tech Republic Security

Is the NSA hacker a whistleblower or traitor? Hero or villain? Take our poll and tell us whether you think Edward Snowden deserves a break.

136
136
article thumbnail

5 things we learned about the state of cybersecurity from Structure Security 2016

Tech Republic Security

The first annual Structure Security conference took place in San Francisco in September. Here are the top takeaways.

article thumbnail

How to enable two-step authentication in Dropbox

Tech Republic Security

Concerned about the security of your Dropbox account? For an added layer of protection, follow this process of setting up two-step authentication in Dropbox.

article thumbnail

Why operational technology must be addressed to secure industrial IoT

Tech Republic Security

At the 2016 Structure Security conference, GE's Tom Le explained how a combination of IT and OT are core to securing industrial IoT.

IoT 137
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.