March, 2017

article thumbnail

New IBM security tool uses machine learning to help businesses detect phishing

Tech Republic Security

A new solution from IBM Trusteer automates website classification and can help label phishing websites 250% faster than traditional methods.

Phishing 167
article thumbnail

Black box discovery of memory corruption RCE on box.com

Scary Beasts Security

Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bad beat: practical attacks against poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Application Security Management: Managing Vulnerabilities Throughout Secure SDLC

NopSec

How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.

Risk 52
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Tails 6.4 releases: privacy-focused operating system based on Debian Linux

Penetration Testing

Tails OS, also known as “The Amnesic Incognito Live System,” is a privacy-focused operating system based on Debian Linux. It is designed to protect your online privacy and anonymity by routing all your internet... The post Tails 6.4 releases: privacy-focused operating system based on Debian Linux appeared first on Cybersecurity News.

article thumbnail

Reflection on Working From Home

The Falcon's View

In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.

More Trending

article thumbnail

Transitioning from my CISO role at DataGravity

Andrew Hay

As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.

CISO 40
article thumbnail

Your internet history is now for sale. Here's how you can protect it

Tech Republic Security

Congress has voted to repeal restrictions preventing ISPs from gathering and selling your browsing data and other personal info. Here's how you can protect yourself.

Internet 166
article thumbnail

The 21 best IT and tech memes on the Internet

Tech Republic Security

From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer

Internet 166
article thumbnail

macOS malware on the rise as Apple silently patches a mysterious new threat called Proton

Tech Republic Security

No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.

Malware 165
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Yahoo confirms 32M accounts breached in 2015-2016 forged cookies attack

Tech Republic Security

In a recent annual report filed with the SEC, Yahoo confirmed that forged cookies were used to hack 32 million accounts. Here's what it means and why your company should be aware of such attacks.

article thumbnail

How to use OverSight to track when hackers access your webcam

Tech Republic Security

Certain Mac malware can access a user's webcam to spy on them undetected. Here's how you can use the free tool OverSight to protect yourself.

Malware 164
article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

Search the world's largest cybercrime library

Tech Republic Security

The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, prosecutors, and judges.

article thumbnail

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

Tech Republic Security

Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.

article thumbnail

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Report: Ransomware attacks grew 600% in 2016, costing businesses $1B

Tech Republic Security

Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.

article thumbnail

New technique claims '100% protection' against internet cyberattacks

Tech Republic Security

Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.

Internet 150
article thumbnail

Report: Drones will impact business, but this one thing is holding them back

Tech Republic Security

A new report from the ISACA said that security and privacy are the top concerns for business leaders looking to implement drone technology in their organization.

article thumbnail

Bad news, Android devs: 40 percent of apps in the market are leaving sensitive backdoors exposed

Tech Republic Security

Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.

Marketing 150
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

IBM report: Leaked records hit 4B, up 566% since last year

Tech Republic Security

Cybercriminals compromised more than 4 billion records last year, including credit cards, passwords, health information, and business documents. Here's how to stay safe.

Passwords 147
article thumbnail

Here are the top 6 ways websites get hacked, according to Google

Tech Republic Security

Google recently noted that it had seen a 32% rise in hacked website. Here are the most common tactics it found.

Hacking 144
article thumbnail

How to enable https on Apache CentOS

Tech Republic Security

For some businesses, serving up websites via HTTPS is a must-have. Here's how to configure secure http Apache on CentOS.

144
144
article thumbnail

Deep packet inspection: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.

143
143
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

Tech Republic Security

Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.

Hacking 141
article thumbnail

In 2016, Pence used hacked personal email account to discuss homeland security issues

Tech Republic Security

A public records request submitted by IndyStar showed that Mike Pence used his personal AOL account, which was hacked, to discuss security issues with top advisors while he was governor of Indiana.

article thumbnail

How to install the OpenVAS vulnerability scanner on Ubuntu 16.04

Tech Republic Security

If you're looking for a single tool to run vulnerability scanning on the systems you administer, OpenVAS might be the security tool you need.

141
141
article thumbnail

How to install and use eCryptfs on Ubuntu

Tech Republic Security

If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?