November, 2016

article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

167
167
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Modeling the PASTA Way

Adam Shostack

There’s a really interesting podcast with Robert Hurlbut Chris Romeo and Tony UcedaVelez on the PASTA approach to threat modeling. The whole podcast is interesting, especially hearing Chris and Tony discuss how an organization went from STRIDE to CAPEC and back again. There’s a section where they discuss the idea of “think like an attacker,” and Chris brings up some of what I’ve written (“ ‘Think Like an Attacker’ is an opt-in mistake.”) I th

Risk 100
article thumbnail

Royal flush: an in-depth look at poker cheating devices accessories

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Ransomware Attacks the Cloud!

Spinone

Ransomware is currently one of the fastest-growing security threats facing individuals and organizations today. Ransomware works by infiltrating a user’s PC or mobile device via malicious software that is usually installed unintentionally after clicking a link in an email or because it is posing as something else. Once installed, the software uses cryptography to prevent the user from accessing his or her files and demands a sum of money to be paid before the files are unencrypted.

article thumbnail

Germany to audit 500 companies on data transfers

Privacy and Cybersecurity Law

Germany to audit 500 companies The German data protection authorities have announced today that they have chosen 500 companies throughout […].

52

More Trending

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

Media 101
article thumbnail

Gavle Lessons: 56% Is Not Sufficiently More Secure!

Adam Shostack

In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat. Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends. The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.

article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Risk 167
article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

Hacking 158
article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 155
article thumbnail

Apple encryption war continues: NY DA requests 400 iPhones be unlocked

Tech Republic Security

The New York district attorney recently released a report calling for smartphone manufacturers to create operating systems that allow them to more easily access user data.

article thumbnail

Video: FBI cybersecurity chief talks about aftermath of Wikileaks, Snowden, and 2016 election

Tech Republic Security

The FBI has a long legacy of being at the forefront of technology, but managing those systems while keeping up with the latest advances in tech is an unforgiving task.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Despite privacy concerns, Microsoft calls Windows 10 'the most secure version of Windows'

Tech Republic Security

Microsoft recently penned a blog post explaining some of the security updates in the Windows 10 Anniversary Edition, especially dealing with protecting against ransomware.

article thumbnail

The state of malware: 4 big takeaways from AV-TEST's 2016 report

Tech Republic Security

The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe.

Malware 154
article thumbnail

Worried about Windows 10 snooping? Here's how you can stop it

Tech Republic Security

Attempts to stem the quantity of data that Windows 10 gathers on users continue to this day. Here are the options available if you're uncomfortable with how much data the OS hoovers up.

151
151
article thumbnail

Five password management apps that will work on all your devices

Tech Republic Security

Password security is essential. We have more passwords than ever before and most of us don't take them seriously. You can keep yourself safe with a password manager: Here are five worth checking out.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Why your company needs a social media policy

Tech Republic Security

Half of employees say that their company does not have rules about using social media at work. Here's what you need to craft a social media policy to protect your data and avoid legal trouble.

Media 148
article thumbnail

66% of organizations won't recover after cyberattack, study says

Tech Republic Security

IBM and the Ponemon Institute's 2016 Cyber Resilient Organization study found that cyber resilience among enterprise organizations is dropping.

166
166
article thumbnail

Tweets aren't tools for surveillance: Twitter pushes back against law enforcement

Tech Republic Security

In a recent blog post, the social media company clarified the acceptable use of its public APIs, pushing back against tweets being used to track protesters and activists.

article thumbnail

How to quickly audit a Linux system from the command line

Tech Republic Security

For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.

167
167
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Can you solve some of the most complicated cryptographic puzzles in the world?

Tech Republic Security

The UK's Government Communication Headquarters (GCHQ) are some of the best code breakers in the world. Think you have what it takes to be a cryptanalyst? Find out here.

article thumbnail

LastPass: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about password management app LastPass, including its newly announced free cross-platform access.

article thumbnail

Infographic: Small business is vulnerable to cyberattack

Tech Republic Security

According to a survey by data firm Carbonite 74% of small business owners fear Washington politicians are not doing enough to protect companies against cyberattack.

article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

IoT 167
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

UK to invest $2.3B in cybersecurity, calls for stronger authentication

Tech Republic Security

Over the next five years, the UK government will invest heavily in cybersecurity, including new authentication methods such as Fast IDentity Online (FIDO).

article thumbnail

Five essential cybersecurity audiobooks

Tech Republic Security

A curated list of cybersecurity audiobooks to help you better understand the history of computing, who hacks and why, and the future of cyber-defense.

article thumbnail

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG.

Firewall 136
article thumbnail

How to secure your Apache 2 server in four steps

Tech Republic Security

If you're concerned about the security of your Apache server, these four tips will go a long way to keeping that system secure.

162
162
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.