2016

article thumbnail

Here are the biggest IoT security threats facing the enterprise in 2017

Tech Republic Security

The coming year will bring a large-scale IoT security breach, with fleet management, retail, manufacturing, and government at the biggest risk, according to experts.

IoT 167
article thumbnail

[0day] [exploit] Compromising a Linux desktop using. 6502 processor opcodes on the NES?!

Scary Beasts Security

Overview A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete “scripting” inside a music player. NSF files are music files from the Nintendo Entertainment System.

Banking 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Earthrise

Adam Shostack

Image credit: Bill Anders, Apollo 8 , launched this day, Dec 21, 1968.

130
130
article thumbnail

Experts predict 2017's biggest cybersecurity threats

Tech Republic Security

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cybersecurity threats likely to materialize in the next year.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Electronics-sniffing dogs: How K9s became a secret weapon for solving high-tech crimes

Tech Republic Security

Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.

167
167
article thumbnail

4 ways your company can avoid Yahoo-level stupidity in enterprise security

Tech Republic Security

Yahoo recently confirmed a leak of one billion accounts, adding to its growing list of security woes. Here are four actions your company can take to prevent a similar debacle.

More Trending

article thumbnail

NFL Wi-Fi, cyberwar training, and hacking diabetes care: TechRepublic's cover stories of 2016

Tech Republic Security

We work hard to provide in-depth investigative tech journalism. Here's what we've reported in 2016.

Hacking 167
article thumbnail

Android backdoor is secretly sending user data and texts to China, and no one knows why

Tech Republic Security

Security firm Kryptowire recently discovered a backdoor in some budget Android phones that secretly sends information like text messages, location data, and call logs to a server in China.

167
167
article thumbnail

How to secure your IoT devices from botnets and other threats

Tech Republic Security

Attacks on IoT devices are an increasing threat. Here are a few expert tactics to ensure your company's data and networks are safe.

IoT 167
article thumbnail

Learn cybersecurity basics with these essential YouTube videos

Tech Republic Security

A hand-picked list of must-watch cybersecurity videos to help you learn the fundamentals of encryption, how hackers penetrate systems, and strong cyber-defense tactics for business.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Interview with a hacker: S1ege from Ghost Squad Hackers

Tech Republic Security

Ghost Squad Hackers has emerged as one of the world's most influential indie hacking teams. S1ege, the group's 'administrator,' explains his tactics, how the group works, and the ethics of hacking.

Hacking 167
article thumbnail

How to quickly audit a Linux system from the command line

Tech Republic Security

For a deep penetrating scan of your Linux servers and desktops, turn to the Lynis auditing tool. Check out how to install and use Lynis.

167
167
article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros. The handbook includes tech recommendations on 50 controls, interviews, and vendor lists.

article thumbnail

2017 cybercrime trends: Expect a fresh wave of ransomware and IoT hacks

Tech Republic Security

This year companies were rocked by over 90 million cyberattacks. In 2017 the number could double. Cybersecurity expert Sameer Dixit explains how new innovation leads to increased vulnerability.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Gallery: The 10 biggest business hacks of 2016

Tech Republic Security

This year thousands of cyber-attacks cost companies millions in damages and exposed billions of sensitive consumer and corporate records. These are the 10 biggest business hacks of 2016.

Hacking 167
article thumbnail

Five ways to maintain your privacy on your smartphone, no downloads required

Tech Republic Security

You can download apps to audit your privacy, but who's to say those apps aren't a security risk themselves? Here are five tips for maintaining your privacy in the always-connected world.

Risk 167
article thumbnail

Interview with a hacker: Gh0s7, leader of Shad0wS3c

Tech Republic Security

One of the world's top hackers reveals how attackers own corporate and government networks, how stolen data is sold, which exploit markets are exploding, and why hackers are excited about Android and IoT.

IoT 167
article thumbnail

Dark Web: The smart person's guide

Tech Republic Security

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Blockchain: The smart person's guide

Tech Republic Security

This comprehensive guide covers everything you need to know about the blockchain, the innovative technology that powers Bitcoin, Litecoin, and other cryptocurrencies.

article thumbnail

The light side of the Dark Web

Tech Republic Security

The Dark Web isn't all bad news. A study by security firm Terbium Labs found that over half of the encrypted internet consists of legal traffic, and instances of hacking and fraud were shockingly low.

article thumbnail

How to fix Apache 2 not executing PHP files

Tech Republic Security

If your Apache 2 web server is failing to execute PHP files, learn how to quickly remedy this issue.

167
167
article thumbnail

66% of organizations won't recover after cyberattack, study says

Tech Republic Security

IBM and the Ponemon Institute's 2016 Cyber Resilient Organization study found that cyber resilience among enterprise organizations is dropping.

167
167
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to install Advanced Intrusion Detection Environment on CentOS

Tech Republic Security

For an added layer of security on your CentOS system, you should consider installing Advanced Intrusion Detection Environment. Find out why.

167
167
article thumbnail

Video: The top 5 reasons you should care about privacy

Tech Republic Security

Here are five things that might convince you to care about your personal data, even if you think you don't.

167
167
article thumbnail

Experts share their cybersecurity horror stories

Tech Republic Security

From IoT hacks to economic collapse, four security executives share their scariest hacking and attacking scenarios and shine a light on emerging cyber-threats.

IoT 167
article thumbnail

Snowden blasts US justice department, says Petraeus leaks 'far more highly classified' than his own

Tech Republic Security

In a recent interview with Yahoo's Katie Couric, former NSA contractor Edward Snowden spoke about how he believes justice in the US is 'two-tiered.

167
167
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Zero in on IT security risks by applying the 80/20 rule to vulnerability assessments

Tech Republic Security

It is impossible to defend everything; the Pareto Principle, also known as the 80/20 rule, is one way for IT security pros to determine what's most important to protect.

Risk 167
article thumbnail

Delete unused Android apps now, or risk a security nightmare

Tech Republic Security

Your Android device most likely contains unused apps that could still use data or fall prey to vulnerabilities. The solution to this potential security problem: delete those apps.

Risk 167
article thumbnail

Help wanted: Universities double down on security to help fill 1 million open jobs

Tech Republic Security

Universities are increasingly including cybersecurity majors and concentrations to better prepare students to fill the many open jobs that exist globally in the field.

article thumbnail

4 security measures that strengthen big data governance

Tech Republic Security

Discover how revisions to security processes can help protect your company's data.

Big data 166
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?