July, 2017

article thumbnail

How blockchain could revolutionize IoT security

Tech Republic Security

There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.

IoT 167
article thumbnail

How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud

Lenny Zeltser

When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.

VPN 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding how people use private browsing

Elie

This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.

Internet 103
article thumbnail

VMware Fusion Kali USB Boot

Kali Linux

VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Fighting the War with the Right Weapon: Countering Complexity with Automation

NopSec

Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.

article thumbnail

HHS Issues Quick Response Cyber Attack Checklist

Privacy and Cybersecurity Law

Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].

More Trending

article thumbnail

How Ransomware Hackers Cash Out Bitcoins

Spinone

Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.

article thumbnail

Attacking encrypted USB keys the hard(ware) way

Elie

Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.

article thumbnail

10 books on cybersecurity that all IT leaders should read

Tech Republic Security

Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.

article thumbnail

Russia VPN ban: What tech pros and business travelers need to know

Tech Republic Security

Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.

VPN 160
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CopyCat malware infects 14M devices, shows 'unprecedented success rate'

Tech Republic Security

Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.

Malware 159
article thumbnail

Top 5: Things to know about cloud security

Tech Republic Security

Knowing the basics of cloud security can help you pick a better cloud provider. Here are five bits of important information.

157
157
article thumbnail

Worried about ransomware? Here are 3 things IT leaders need to know before the next big outbreak

Tech Republic Security

It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.

article thumbnail

Why enterprises are finally paying up for big data security

Tech Republic Security

Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data.

Big data 154
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

With this $7 malware, anyone can be a hacker for cheap

Tech Republic Security

Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions.

Malware 154
article thumbnail

The 3 most in-demand cybersecurity jobs of 2017

Tech Republic Security

Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.

article thumbnail

VMware NSX: The smart person's guide

Tech Republic Security

VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.

154
154
article thumbnail

UN report: 50% of countries have no cybersecurity strategy in place

Tech Republic Security

Singapore and the US top the list of countries with the greatest commitment to cybersecurity. However, most other countries are lacking in their approach to cybercrime, hacking, and more.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Massive cyberattack on US critical infrastructure will hit within 2 years, say 60% of security pros

Tech Republic Security

New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.

article thumbnail

macOS users beware: A new and nearly undetectable malware is on the rise

Tech Republic Security

Often thought of as impenetrable, macOS is falling prey to a sneaky malware that's stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here.

Malware 146
article thumbnail

Almost half of IT security incidents are caused by company employees, report says

Tech Republic Security

Uninformed or careless employees are one of the top causes of a cybersecurity incident, according to a Kaspersky Lab report.

article thumbnail

Five more ways to minimize fileless malware infections

Tech Republic Security

Beyond disabling macros, restricting unnecessary scripting languages, and being diligent about patch management, there are many other ways to protect your systems against fileless malware.

Malware 146
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

IBM boosts security testing for IoT, connected cars with new services from X-Force Red

Tech Republic Security

IBM's new security testing services will help businesses find vulnerabilities in their automotive endeavors and Internet of Things deployments.

IoT 145
article thumbnail

Massive Amazon S3 breaches highlight blind spots in enterprise race to the cloud

Tech Republic Security

Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.

143
143
article thumbnail

Gallery: 10 free backup applications to help you prevent disaster

Tech Republic Security

Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.

Backups 141
article thumbnail

The secret to Google's rock-solid security is now commercially available

Tech Republic Security

A new startup aims to commercialize a security approach birthed at Google. It just might work.

139
139
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

These 10 US states have the highest rate of malware infections in the country

Tech Republic Security

A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.

Malware 139
article thumbnail

Your website suffers 22 cyberattacks per day, here's how to stay protected

Tech Republic Security

New research from SiteLock reveals that no website is too small to hack. Here is the data showing who is most vulnerable, and what mediums cybercriminals use to compromise sites.

Hacking 137
article thumbnail

Why cyberattacks should keep CFOs up at night

Tech Republic Security

Hacking incidents cost companies millions of dollars on average. Here's why the CFO needs to be involved in cybersecurity strategies from the start.

Hacking 135
article thumbnail

New Microsoft cloud service uses AI to find bugs in your code

Tech Republic Security

Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?