May, 2016

article thumbnail

How to easily encrypt/decrypt a file in Linux with gpg

Tech Republic Security

Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.

article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware Analysis: Moving Beyond the CVSS Score

NopSec

Note: This article was updated in June 2022. Here at NopSec, we are all about risk — our number one goal as a company to help organizations evaluate and reduce their risk. However, the term “risk” can be highly subjective, making it difficult for organizations to determine the riskiest vulnerabilities. One quantitative measure NopSec employs to help an organization evaluate the risk of a vulnerability is through malware correlation.

Malware 52
article thumbnail

Office of the Privacy Commissioner announces first investigation under the address harvesting provisions

Privacy and Cybersecurity Law

Today, the Office of the Privacy Commissioner (OPC) announced its report of findings against Compu-Finder, a Quebec-based company that offers […].

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Cyberwar: The smart person's guide

Tech Republic Security

Armies around the world are gearing up for cyberwarfare: here's what it is and what you need to know.

121
121
article thumbnail

Microsoft believes blockchain tech could help fight human trafficking, child exploitation

Tech Republic Security

Microsoft is partnering with ConsenSys and Blockstack Labs to build an open source, blockchain-based identity system to help provide legal identification for people around the world.

117
117

More Trending

article thumbnail

IBM Watson takes on cybercrime with new cloud-based cybersecurity technology

Tech Republic Security

Eight universities have begun a year-long initiative to train IBM Watson for work in cybersecurity. Will the Jeopardy champ soon police the internet?

article thumbnail

5 ways to secure OS X

Tech Republic Security

With OS X security exploits on the rise, Jesus Vigo takes a look at 5 ways to better protect your Mac from malware infections and data loss.

Malware 113
article thumbnail

CompTIA report: Almost half of companies believe their security is 'good enough'

Tech Republic Security

A recent security report from CompTIA found that while threats are growing stronger, many enterprises still aren't ready to face them.

111
111
article thumbnail

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

Tech Republic Security

The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.

Hacking 111
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Businesses beware: the 'industrial internet of things' is a prime target for cyberattacks

Tech Republic Security

Think your Amazon Echo or Samsung Smart TV are IoT security threats? Businesses using the 'industrial internet of things' are even bigger targets for cyberattacks.

Internet 109
article thumbnail

Russian facial recognition program beats Google, but big privacy questions linger

Tech Republic Security

NTechLab's facial recognition app uses AI to identify a face among billions of photos in less than a second, and is one of the best in the world, but the Russian startup draws concerns from academics.

109
109
article thumbnail

11+ security questions to consider during an IT risk assessment

Tech Republic Security

IT risk assessments are crucial to minimize the fallout from cyberattacks. Experts explain why and suggest what questions to consider to assess your company's risk.

Risk 108
article thumbnail

5 more ways to secure OS X

Tech Republic Security

Apple devices aren't impervious to threats against your data. Here are 5 more methods for keeping your information safe.

106
106
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Cybersecurity in 2020: The future looks bleak

Tech Republic Security

Experts offer five scenarios they suspect will wreak havoc on cybersecurity by 2020.

article thumbnail

Malware goes to war: Potential tools, uses, and targets of cyberweapons

Tech Republic Security

Researchers look at what it means when cyberweapons have the same status as traditional weapons of war.

Malware 100
article thumbnail

Report: The economy of criminal hackers and how businesses can protect themselves

Tech Republic Security

HPE's new Business of Hacking report takes a look at the underground world of criminal hackers and what steps businesses can take to stay secure.

Hacking 98
article thumbnail

Are you being exploited by online marketers using "tricks for clicks"?

Tech Republic Security

By definition, marketing is all about getting people to do something. Make sure the "doing something" is your decision and not the marketers'.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Business ID theft: Slow progress in the battle against fraudsters

Tech Republic Security

Read about the potential devastating effects of business ID theft, and what steps experts are taking to address this issue.

91
article thumbnail

Samsung Knox isn't as secure as you think it is

Tech Republic Security

Israeli researchers recently found a slew of security flaws in the Samsung Knox security system commonly used in Android phones.

82
article thumbnail

Potential IoT legal challenges should be on your enterprise radar

Tech Republic Security

Lack of existing case law may fuel legal battles in which companies in the IoT market will have the most to lose.

IoT 79
article thumbnail

How public cloud providers are making security a non-issue for app developers

Tech Republic Security

Developers would often rather write apps than secure them, but public cloud providers can help them do both.

79
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to effectively clear your bash history

Tech Republic Security

If you're serious about security on your Linux machines, you might want to clear the bash history. Learn how to do this more effectively than with just a single command.

77
article thumbnail

Android Security Update May 2016: What you need to know

Tech Republic Security

The Android Security Update for May 2016 includes a number of critical issues. Jack Wallen has the highlights, and shows how to find out if your device is up to date.

74
article thumbnail

ImageMagick users beware: Multiple vulnerabilities leave servers compromised

Tech Republic Security

The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.

64
article thumbnail

How to add a simple password manager to Ubuntu Touch

Tech Republic Security

For an easy-to-use password manager for the Ubuntu Touch platform, Jack Wallen recommends the no-frills app password-shroud.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

3 Ways to Go Beyond HIPAA Compliance

NopSec

Compliance isn’t enough for healthcare organizations. For years, we have equated compliance with effective vulnerability risk management. This is simply not the case. Recent highly publicized data breaches in major hospitals show that minimum compliance is not effective when protecting your data. In fact, it’s not just major healthcare organizations that get attacked, but virtually all hospitals have been victims of a cyber attack (commonly ransomware) at some point in varying degrees.

article thumbnail

SMBs: Most Likely To Be Hacked?

NopSec

Most small and medium business owners believe that cyber criminals only target large businesses and corporations. They couldn’t be more wrong. In 2015, 62% of all data breaches were against SMBs according to IBM and the Ponemon Institute. Considering that a majority of business entities in the United States are small and medium businesses, and most of them do not have robust information security programs in place, there is definitely an incentive in targeting SMBs instead.

Hacking 52
article thumbnail

Live Streaming Security Games

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40
article thumbnail

LIVE STREAMING SECURITY GAMES

ForAllSecure

Aside from our cool research , ForAllSecure also works on creating fun and engaging games to promote computer security. Just about every employee in our company has been involved in Capture the Flag exercises for the past several years, and we have been hosting these online events for our customers for about 3 years now. One of our big dreams is to see these types of contests gain in popularity, similar to how e-sports grew.

Hacking 40
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?