How blockchain could revolutionize IoT security
Tech Republic Security
JULY 17, 2017
There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.
Tech Republic Security
JULY 17, 2017
There may be a way to secure processing-starved IoT devices by using a new approach to blockchain. Read about researchers' proposal.
Lenny Zeltser
JULY 6, 2017
When analyzing malware or performing other security research, it’s often useful to tunnel connections through a VPN in a public cloud. This approach helps conceal the analyst’s origin, contributing to OPSEC when interacting with malicious infrastructure. Moreover, by using VPN exit nodes in different cities and even countries, the researcher can explore the target from multiple geographic vantage points, which sometimes yields additional findings.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Elie
JULY 13, 2017
This post looks at how and why people are using the private browsing mode. Private Browsing. , also known as. InPrivate. in Internet Explorer and. Incognito mode. in Google Chrome, is a special mode where the browser doesn’t record the browsing activity on the local device. The promise made to the user is that when the private windows are closed, no trace will be left on the computer.
Kali Linux
JULY 25, 2017
VMware Fusion Kali USB Boot One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Linux in your pocket, ready to launch whenever you need it. Building Kali live USB installations is pretty straightforward, whether you’re going for plain installation, building in persistence so you can store files, going fully-encrypted (even
Advertisement
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
NopSec
JULY 19, 2017
Here at NopSec, we have always been fascinated with automation. It has been a focus of ours since the beginning of our cybersecurity SaaS solution launch, Unified VRM , back in 2012. We first tackled the complexity of correlating several commercial and open-source networks and web application scanner’s results by automating the import of results via files or directly via API.
Privacy and Cybersecurity Law
JULY 13, 2017
Last month, after the WannaCry ransomware attack infected 230,000 computers in 150 countries, the US Department of Health and Human […].
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Spinone
JULY 31, 2017
Research at Google presented a study on the ransomware ecosystem recently. The research talks about a variety of popular topics such as the flow of ransom payments from a victim to a hacker and also ways to exchange bitcoins, either by purchasing them or cashing them out. The study also uses graphs to show annual incomes of Locky , Cerber and WannaCry malwares, and the rise of Ransomware as a service , where anyone can become a hacker.
Elie
JULY 26, 2017
Ever wondered if your new shiny AES hardware-encrypted USB device really encrypts your data - or is just a fluke? If you have, come to our talk to find out if those products live up to the hype and hear about the results of the audit we conducted on multiples USB keys and hard drives that claim to securely encrypt data. In this talk, we will present our methodology to assess "secure" USB devices both from the software and the hardware perspectives.
Tech Republic Security
JULY 24, 2017
Want to start learning about cybersecurity? Check out TechRepublic's top 10 titles to understand how hackers have stolen millions in private data, how governments wage cyberwar, and how to beef up security systems.
Tech Republic Security
JULY 31, 2017
Russian President Vladimir Putin recently signed a law prohibiting the use of VPNs, while Apple pulled VPN apps from the Chinese App Store. Here is how business travelers can respond.
Advertisement
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
Tech Republic Security
JULY 7, 2017
Check Point researchers have identified a new malware that they said infected some 14 million devices, rooting 8 million of them. The malware has generated $1.5 million for attackers.
Tech Republic Security
JULY 13, 2017
Knowing the basics of cloud security can help you pick a better cloud provider. Here are five bits of important information.
Tech Republic Security
JULY 21, 2017
It's only a matter of time before another WannaCry-style ransomware outbreak, but you don't have to be a victim. Here's what IT leaders need to know in order to safeguard themselves and their users.
Tech Republic Security
JULY 5, 2017
Companies like Cloudera and Hortonworks are cashing in as enterprises finally get serious about securing big data.
Advertisement
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
Tech Republic Security
JULY 14, 2017
Proofpoint security researchers examined the Ovidiy Stealer malware, which steals credentials and operates primarily in Russian-speaking regions.
Tech Republic Security
JULY 17, 2017
Amid a shortage of skilled cybersecurity professionals, here are the three positions in the field that companies are seeking out the most, according to tech staffing firm Mondo.
Tech Republic Security
JULY 10, 2017
VMware's NSX hypervisor provides a platform to manage virtualized network deployments. Learn more about the network virtualization platform in this resource guide.
Tech Republic Security
JULY 6, 2017
Singapore and the US top the list of countries with the greatest commitment to cybersecurity. However, most other countries are lacking in their approach to cybercrime, hacking, and more.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
JULY 7, 2017
New Black Hat Research suggests that a major breach on US infrastructure could be imminent, and government agencies won't be able to react appropriately.
Tech Republic Security
JULY 14, 2017
Often thought of as impenetrable, macOS is falling prey to a sneaky malware that's stealing bank credentials, bypassing Gatekeeper, and disabling attempts to remove it. Find out more here.
Tech Republic Security
JULY 10, 2017
Uninformed or careless employees are one of the top causes of a cybersecurity incident, according to a Kaspersky Lab report.
Tech Republic Security
JULY 5, 2017
Beyond disabling macros, restricting unnecessary scripting languages, and being diligent about patch management, there are many other ways to protect your systems against fileless malware.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
JULY 25, 2017
IBM's new security testing services will help businesses find vulnerabilities in their automotive endeavors and Internet of Things deployments.
Tech Republic Security
JULY 18, 2017
Data leaks at Dow Jones, Verizon, and a GOP analytics firm show that companies are forgoing security best practices in order to quickly make it to the cloud.
Tech Republic Security
JULY 20, 2017
Hardware can fail and malware happens to the best of us. Don't be caught without the ability to restore a computer: Use one of these 10 free backup programs instead.
Tech Republic Security
JULY 19, 2017
A new startup aims to commercialize a security approach birthed at Google. It just might work.
Advertisement
The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.
Tech Republic Security
JULY 19, 2017
A new report from Enigma Software Group compared the malware infection rates in all 50 states over the first six months of 2017. Here are the results.
Tech Republic Security
JULY 12, 2017
New research from SiteLock reveals that no website is too small to hack. Here is the data showing who is most vulnerable, and what mediums cybercriminals use to compromise sites.
Tech Republic Security
JULY 19, 2017
Hacking incidents cost companies millions of dollars on average. Here's why the CFO needs to be involved in cybersecurity strategies from the start.
Tech Republic Security
JULY 24, 2017
Microsoft Security Risk Detection will use artificial intelligence to help developers find bad code and detect security vulnerabilities in their apps.
Speaker: Blackberry, OSS Consultants, & Revenera
Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?
Let's personalize your content