November, 2016

article thumbnail

Don't let yourself be targeted by cybercriminals: Here are 6 tips for safe holiday shopping

Tech Republic Security

Online shopping is easy and convenient, and more people are doing it than ever before. The rise in e-commerce also gives cybercriminals more opportunities to rob you blind. Here's how to stay safe.

167
167
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat Modeling the PASTA Way

Adam Shostack

There’s a really interesting podcast with Robert Hurlbut Chris Romeo and Tony UcedaVelez on the PASTA approach to threat modeling. The whole podcast is interesting, especially hearing Chris and Tony discuss how an organization went from STRIDE to CAPEC and back again. There’s a section where they discuss the idea of “think like an attacker,” and Chris brings up some of what I’ve written (“ ‘Think Like an Attacker’ is an opt-in mistake.”) I th

Risk 100
article thumbnail

Royal flush: an in-depth look at poker cheating devices accessories

Elie

In-depth research publications, industry talks and blog posts about Google security, research at Google and cybersecurity in general in open-access.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Ransomware Attacks the Cloud!

Spinone

Ransomware is currently one of the fastest-growing security threats facing individuals and organizations today. Ransomware works by infiltrating a user’s PC or mobile device via malicious software that is usually installed unintentionally after clicking a link in an email or because it is posing as something else. Once installed, the software uses cryptography to prevent the user from accessing his or her files and demands a sum of money to be paid before the files are unencrypted.

article thumbnail

FTC Announces New Guidance on Ransomware

Privacy and Cybersecurity Law

On November 10, 2016, the U.S. Federal Trade Commission (FTC) released new guidance for businesses and consumers on the impact […].

More Trending

article thumbnail

[0day] [exploit] Advancing exploitation: a scriptless 0day exploit against Linux desktops

Scary Beasts Security

Overview A powerful heap corruption vulnerability exists in the gstreamer decoder for the FLIC file format. Presented here is an 0day exploit for this vulnerability. This decoder is generally present in the default install of modern Linux desktops, including Ubuntu 16.04 and Fedora 24. Gstreamer classifies its decoders as “good”, “bad” or “ugly”. Despite being quite buggy, and not being a format at all necessary on a modern desktop, the FLIC decoder is classified as “good”, almost guaranteeing i

Media 101
article thumbnail

Gavle Lessons: 56% Is Not Sufficiently More Secure!

Adam Shostack

In September, we shared the news that for its 50th year, the people of Gävle paid an extra $100,000 to secure the goat. Sadly, it seems to have not helped. Today, the goat tweeted: Oh no, such a short amount of time with you my friends. The obvious lesson is that the Swedes have a ransomware problem, and the goat should stop clicking on links in email.

article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

IoT 167
article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

167
167
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

How to quickly audit a Linux system from the command line

Tech Republic Security

For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.

167
167
article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Risk 167
article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

66% of organizations won't recover after cyberattack, study says

Tech Republic Security

IBM and the Ponemon Institute's 2016 Cyber Resilient Organization study found that cyber resilience among enterprise organizations is dropping.

167
167
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

How to secure your Apache 2 server in four steps

Tech Republic Security

If you're concerned about the security of your Apache server, these four tips will go a long way to keeping that system secure.

166
166
article thumbnail

Apple encryption war continues: NY DA requests 400 iPhones be unlocked

Tech Republic Security

The New York district attorney recently released a report calling for smartphone manufacturers to create operating systems that allow them to more easily access user data.

article thumbnail

Video: FBI cybersecurity chief talks about aftermath of Wikileaks, Snowden, and 2016 election

Tech Republic Security

The FBI has a long legacy of being at the forefront of technology, but managing those systems while keeping up with the latest advances in tech is an unforgiving task.

article thumbnail

How to hack an election: An interview with security expert Calvin Liu

Tech Republic Security

Voter fraud has been a hot topic this election cycle, but there are still two fundamental questions to be asked: Can widescale election fraud happen and if so will hackers be the ones to pull it off?

Hacking 164
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Firms that force you to change your password are clueless says cyber security chief

Tech Republic Security

Security expert rails against the bad advice that everybody follows and the industry's addiction to hyperbole.

Passwords 164
article thumbnail

Despite privacy concerns, Microsoft calls Windows 10 'the most secure version of Windows'

Tech Republic Security

Microsoft recently penned a blog post explaining some of the security updates in the Windows 10 Anniversary Edition, especially dealing with protecting against ransomware.

article thumbnail

3 tips to reducing big data compliance risks

Tech Republic Security

Don't let big data compliance risks take you by surprise. Here are three steps to take today to ease your big data compliance concerns.

Big data 162
article thumbnail

Privacy issues abound as UK passes controversial 'snoopers' charter'

Tech Republic Security

A new bill, recently passed by both parliamentary houses, requires UK ISPs to store user internet history for up to a year, and to decrypt data as needed for police investigations.

Internet 162
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

The state of malware: 4 big takeaways from AV-TEST's 2016 report

Tech Republic Security

The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe.

Malware 161
article thumbnail

LastPass: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about password management app LastPass, including its newly announced free cross-platform access.

article thumbnail

UK to invest $2.3B in cybersecurity, calls for stronger authentication

Tech Republic Security

Over the next five years, the UK government will invest heavily in cybersecurity, including new authentication methods such as Fast IDentity Online (FIDO).

article thumbnail

Worried about Windows 10 snooping? Here's how you can stop it

Tech Republic Security

Attempts to stem the quantity of data that Windows 10 gathers on users continue to this day. Here are the options available if you're uncomfortable with how much data the OS hoovers up.

159
159
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Windows 10 snooping: Microsoft gets more time to tackle 'excessive' data collection

Tech Republic Security

Microsoft has been granted more time to change how Windows 10 collects data about users in order to comply with the French data protection act.

article thumbnail

How to add more entropy to improve cryptographic randomness on Linux

Tech Republic Security

If you have Linux servers that depend upon encryption, you owe it to yourself to beef up the system entropy. Here's how to do so with haveged.

article thumbnail

Five essential cybersecurity audiobooks

Tech Republic Security

A curated list of cybersecurity audiobooks to help you better understand the history of computing, who hacks and why, and the future of cyber-defense.

article thumbnail

Five password management apps that will work on all your devices

Tech Republic Security

Password security is essential. We have more passwords than ever before and most of us don't take them seriously. You can keep yourself safe with a password manager: Here are five worth checking out.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?