March, 2017

article thumbnail

macOS malware on the rise as Apple silently patches a mysterious new threat called Proton

Tech Republic Security

No one is safe from malware these days, even macOS users. 2017 has been a banner year for malware on Apple computers, including a new threat that allows total remote control from a web console.

Malware 163
article thumbnail

Black box discovery of memory corruption RCE on box.com

Scary Beasts Security

Overview Robust evidence existed for the presence of a memory corruption based RCE (remote code execution) on box.com servers. The most likely explanation for the evidence presented is the usage of an old ImageMagick which has known vulnerabilities, combined with lack of configuration lockdown. It's hard to be sure, though: see the section on the Box response below.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Bad beat: practical attacks against poker cheating devices

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Application Security Management: Managing Vulnerabilities Throughout Secure SDLC

NopSec

How can I find security people, how do I deal with budget and time, how should I prioritize, what will have the most impact on the business, what will reduce my risk the most? These are the questions that are facing many security teams. In the vulnerability space many are still working off of spreadsheets and ad hoc reports in order to answer these questions.

Risk 52
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Tails 6.4 releases: privacy-focused operating system based on Debian Linux

Penetration Testing

Tails OS, also known as “The Amnesic Incognito Live System,” is a privacy-focused operating system based on Debian Linux. It is designed to protect your online privacy and anonymity by routing all your internet... The post Tails 6.4 releases: privacy-focused operating system based on Debian Linux appeared first on Cybersecurity News.

article thumbnail

Reflection on Working From Home

The Falcon's View

In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.

More Trending

article thumbnail

Transitioning from my CISO role at DataGravity

Andrew Hay

As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.

CISO 40
article thumbnail

Your internet history is now for sale. Here's how you can protect it

Tech Republic Security

Congress has voted to repeal restrictions preventing ISPs from gathering and selling your browsing data and other personal info. Here's how you can protect yourself.

Internet 166
article thumbnail

5 reasons your company can't hire a cybersecurity professional, and what you can do to fix it

Tech Republic Security

Stagnant wages, high demands, and poor work/life balance compound the skills gap for security practitioners. Here's how your company can better recruit and retain them.

article thumbnail

When you move to the cloud, don't fall asleep on cybersecurity: A 6-part checklist from IBM

Tech Republic Security

Some view cloud migration as a way of outsourcing cybersecurity. IBM recommends you chart out which security features are included in your cloud platform, and which have to be added.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Hackers claim to have compromised 300 million iCloud accounts, demand money from Apple

Tech Republic Security

A group of hackers calling themselves the Turkish Crime Family claim that they will wipe millions of stolen iCloud accounts if Apple doesn't meet their demands.

article thumbnail

Search the world's largest cybercrime library

Tech Republic Security

The UN Cybersecurity Repository is a massive index of cyber-criminal case law and lessons learned used to train law enforcement officers, prosecutors, and judges.

article thumbnail

New IBM security tool uses machine learning to help businesses detect phishing

Tech Republic Security

A new solution from IBM Trusteer automates website classification and can help label phishing websites 250% faster than traditional methods.

Phishing 167
article thumbnail

10 tips for securing microservice architecture

Tech Republic Security

Microservices are subcomponents of applications which can yield greater efficiencies. Learn about their benefits as well as security best practices.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to use OverSight to track when hackers access your webcam

Tech Republic Security

Certain Mac malware can access a user's webcam to spy on them undetected. Here's how you can use the free tool OverSight to protect yourself.

Malware 162
article thumbnail

Bad news, Android devs: 40 percent of apps in the market are leaving sensitive backdoors exposed

Tech Republic Security

Codified Security's research found backdoors that could lead to stolen customer information and worse: They could give hackers access to developer's servers and computers as well.

Marketing 141
article thumbnail

New technique claims '100% protection' against internet cyberattacks

Tech Republic Security

Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video.

Internet 143
article thumbnail

How to enable two-factor authentication on Instagram

Tech Republic Security

Instagram recently made two-factor authentication available to all of its users. Here's how you can use it to add an extra layer of security to your account.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The 21 best IT and tech memes on the Internet

Tech Republic Security

From Bad Luck Brian to Confession Bear to Scumbag Steve, these are the best tech-flavored memes the Internet has to offer

Internet 166
article thumbnail

How to establish strong microservice security using SSL, TLS and API gateways

Tech Republic Security

Microservices require special security measures to reduce risk. Learn the specifics as recommended by an industry expert.

Risk 165
article thumbnail

Report: Ransomware attacks grew 600% in 2016, costing businesses $1B

Tech Republic Security

Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.

article thumbnail

Report: Drones will impact business, but this one thing is holding them back

Tech Republic Security

A new report from the ISACA said that security and privacy are the top concerns for business leaders looking to implement drone technology in their organization.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

40% of industrial computers were hacked in 2016, here are 5 ways to protect your business

Tech Republic Security

Two out of five industrial computers faced cyberattacks in the second half of 2016, according to Kaspersky Lab, and the risk is increasing. Here's how to prevent these attacks.

Hacking 134
article thumbnail

IBM report: Leaked records hit 4B, up 566% since last year

Tech Republic Security

Cybercriminals compromised more than 4 billion records last year, including credit cards, passwords, health information, and business documents. Here's how to stay safe.

Passwords 136
article thumbnail

In 2016, Pence used hacked personal email account to discuss homeland security issues

Tech Republic Security

A public records request submitted by IndyStar showed that Mike Pence used his personal AOL account, which was hacked, to discuss security issues with top advisors while he was governor of Indiana.

article thumbnail

Deep packet inspection: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about deep packet inspection, the practice of sniffing web connections to reveal sensitive user data and fend off cyberattacks.

133
133
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

The CIA has the key to your IoT, but they should be the least of your concerns

Tech Republic Security

The latest batch of WikiLeaks documents reveals something we've always feared: The government has the means to spy on us using our IoT devices. That means anyone else could too.

IoT 127
article thumbnail

How to install and use eCryptfs on Ubuntu

Tech Republic Security

If you're looking for an easy way to encrypt directories in Linux, here's an introduction to eCryptfs. Mount an encrypted directory, add data, and unmount the directory. Data secured.

article thumbnail

Report: 48% more IT professionals are taking security training

Tech Republic Security

As cyber attacks continue to make headlines, more IT professionals are undergoing security training and assessments, paid for by their employers, according to a new report.

article thumbnail

Wikileaks' CIA hacks: Apple says it's already fixed many of the flaws mentioned

Tech Republic Security

A new round of alleged CIA documents were leaked on Tuesday, describing tech tools that allow the agency to hack smartphones and smart TVs. Here's what Apple, Samsung, and Microsoft had to say.

Hacking 126
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.