Blog2017-11-20T19:18:12+00:00

Blog

WHATS NEW WITH US

Black Hat: Protecting Industrial Control System

August 13th, 2018|0 Comments

Industrial Control System (ICS) security was ramped up at Black Hat USA – with packed sessions ranging from specific attacks to vulnerable hardware – all with the aim of protecting critical infrastructure, whose security shortcomings so frequently hit [...]

Less than 30% of SMBs have an IT security pro on staff

August 3rd, 2018|0 Comments

While cybersecurity is vital in SMBs, most remain unequipped to handle concerns and threats, according to a recent report.   https://www.techrepublic.com/videos/video-how-to-hire-and-retain-great-developer-talent/   While SMBs realize they face several security risks, resource constraints keep them from [...]

HP offers hackers $10,000 to find bugs in its printers

August 1st, 2018|0 Comments

HP announced the industry's first printer security bug bounty program to improve IoT security.   https://www.techrepublic.com/videos/5-reasons-to-start-a-bug-bounty-program/   On Tuesday, HP announced a bug bounty program that will give hackers and researchers up to $10,000 if they can [...]

How to make your small business unattractive to cyberattackers

July 23rd, 2018|0 Comments

Cybercriminals perceive small businesses to be lucrative targets. Find out why, and what cybersecurity experts suggest to reduce your digital security risks.   https://www.techrepublic.com/videos/reduce-insider-threats-by-taking-these-simple-steps/   Some small-business owners assume that the size of their company [...]

100% of corporate networks ‘highly vulnerable’ to attacks, here’s how to secure yours

July 20th, 2018|0 Comments

Corporate Wi-Fi networks and employee mistakes make all corporate networks vulnerable to attacks from hackers, according to Positive Technologies.   https://www.techrepublic.com/videos/why-humans-are-an-intractable-cybersecurity-problem/   All corporate networks are highly vulnerable to attacks that would give hackers full [...]

Why a bigger security budget won’t prevent an attack: Here’s a better approach

July 18th, 2018|0 Comments

Enterprises must take a risk-based approach to stop cybercriminals, rather than only throwing money at the problem, according to Gartner.   https://www.techrepublic.com/videos/what-is-the-cios-role-in-cybersecurity-leadership/   Business growth and digital transformation are introducing new cyberattack vectors in the [...]

How to install MyWebSQL on Ubuntu 16.04

July 6th, 2018|0 Comments

MyWebSQL is a user-friendly, web-based MySQL admin tool. This walk-through explains the simple installation process.   https://www.techrepublic.com/videos/how-to-connect-razorsql-to-a-mysql-database-server/   If you use the MySQL database, chances are you're always looking for a better tool to make the administration [...]

LinkedIn CEO: Here are the real skills you need to be successful at work

June 15th, 2018|0 Comments

LinkedIn CEO Jeff Weiner stressed the importance of interpersonal skills in a changing digital world.   https://www.techrepublic.com/videos/top-it-jobs-and-hiring-trends-for-2018-listed-in-tech-pro-research-survey/   In a job market that stresses the importance of finding employees with strong technological skills, a new [...]

5 steps to mitigating wiper malware

June 13th, 2018|0 Comments

Researchers from Cisco's Talos Intelligence Group offer advice on how to thwart wiper malware, which attempts to destroy systems and/or data.   https://www.techrepublic.com/videos/corporate-cyber-defense-spending-hits-a-new-high/   Cisco's Talos Intelligence Group (TIG) has issued a warning. In the white [...]

Net neutrality: A cheat sheet

June 11th, 2018|0 Comments

Do internet service providers have a right to throttle certain traffic? That's the question at the heart of net neutrality, and here's everything you need to know about it.   https://www.techrepublic.com/videos/net-neutrality-what-is-it-and-why-should-you-care/   Let's say you're [...]

How your stolen data ends up on the Dark Web marketplace

June 8th, 2018|0 Comments

Terbium Labs chief research officer Munish Walther-Puri outlined the pathways that hacked data can travel, and who's involved in prevention efforts.   https://www.techrepublic.com/videos/understanding-the-supply-chain-of-stole-data/   TechRepublic's Dan Patterson talked with Munish Walther-Puri, chief research officer of [...]

How hackers can mine cryptocurrency in your serverless computing environment

June 6th, 2018|0 Comments

A newly revealed attack could allow hackers to hijack serverless cloud computing functions to mine cryptocurrency at scale while you pay the bill.   https://www.techrepublic.com/videos/how-to-understand-serverless-architecture-in-the-cloud/   Security researchers at PureSec have discovered an attack method that enables [...]

Chrome, Firefox iframe exploit can steal Facebook profile info and other personal data

June 4th, 2018|0 Comments

A side-channel attack on CSS could expose your personal data to malicious websites, unless you update your browser immediately.   https://www.techrepublic.com/videos/ssl-partly-responsible-for-dramatic-q1-2018-increase-in-malware-and-ransomware/   A pair of independent security researchers has revealed a serious flaw in cascading style sheets [...]

The 6 reasons why we’ve failed to stop botnets

June 1st, 2018|0 Comments

A joint report from the Department of Commerce and the Department of Homeland Security says fighting botnets requires industry and government collaboration.   https://www.techrepublic.com/videos/video-predicting-2018s-biggest-cyber-threats/   A joint report issued Wednesday by the Department of Homeland security and [...]

3 reasons to start using SSL certificates right now

May 21st, 2018|0 Comments

https://www.techrepublic.com/videos/video-online-shopping-at-work-could-expose-your-company-to-cyber-risk/   For many end users, SSL is most commonly associated with the act of online shopping. Particularly the small padlock that appears while attempting to checkout the items stored in your digital shopping cart. [...]

4 tips for making data cleanup easier and more efficient

May 18th, 2018|0 Comments

https://www.techrepublic.com/videos/how-master-data-management-brings-order-to-big-data/   Dirty data costs the US economy up to $3.1 trillion a year and organizations have been trying to deal with it by using methods like deduplication, normalization, or even removing or correcting broken or incomplete [...]

Critical PGP vulnerability could reveal text of your encrypted business emails

May 14th, 2018|0 Comments

The vulnerability, called EFAIL, is exploitable against encrypted email, including previously transmitted mail, according to researchers. By James Sanders  | May 14, 2018, 5:45 AM PST   https://www.techrepublic.com/videos/quantum-encryption-is-about-to-change-everything/   Critical unpatched vulnerabilities in widely-used email encryption tools PGP [...]

Top 5: Things to know about fileless attacks

May 2nd, 2018|0 Comments

https://www.techrepublic.com/videos/5-things-you-should-know-about-fileless-malware-attacks/   Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don't require a payload or tricking someone into [...]

RSA 2018: Behind the lines

April 30th, 2018|0 Comments

More than 42,000 people attended last week’s RSA Conference in San Francisco. If you were not in attendance, hopefully you saw the three reports filed by my colleague, Cameron Camp (Untangling the enterprise security mess, Hacking [...]

How to help employees realize their responsibility in keeping a company safe from data breaches

April 26th, 2018|0 Comments

https://www.techrepublic.com/videos/employees-are-desensitized-to-the-potential-dangers-of-data-compromise/ TechRepublic's Dan Patterson spoke with Christy Wyatt, CEO of Dtex Systems, on the cavalier attitude many employees have regarding data breaches, despite most being aware of the inevitable dangers. Dan Patterson: A new report by [...]

How companies can monetize big data with IoT data control

March 14th, 2018|0 Comments

The oil and gas industry, auto manufacturers and more can maximize the value of IoT deployments with IoT data control. A Cisco exec explains how to manage data control and why it's necessary. https://www.techrepublic.com/videos/the-role-of-iot-data-control-in-maximizing-the-value-of-iot-deployments/ IoT [...]

Salesforce launches conversational queries with Einstein Analytics

March 12th, 2018|0 Comments

The new capability allows business users to type phrases related to their data and instantly view answers in automatically configured charts. https://www.techrepublic.com/videos/video-how-machine-learnings-big-data-reinforcement-loop-works/ Salesforce's new conversational queries will allow business users to 'have a conversation with [...]

New vulnerability in Exim software allows hackers to gain control of your mail server

March 7th, 2018|0 Comments

The popular mail server software has an off-by-one buffer overflow that can be exploited to run arbitrary code. https://www.techrepublic.com/videos/the-benefits-of-integrating-it-and-security-teams/ A critical vulnerability in Exim allows attackers to remotely run arbitrary code without authentication. The vulnerability [...]

GDPR: Regulatory compliance is just the beginning

March 2nd, 2018|0 Comments

Joel Benavides, managing director of global legal services at Box, explains the policies enterprise companies can anticipate with cloud data management after the GDPR. https://www.techrepublic.com/videos/gdpr-regulatory-compliance-is-just-the-beginning/ We have just a few months until the GDPR hits. [...]

How to protect Macs from malware threats

February 28th, 2018|0 Comments

Read tips on how to secure Macs from malware, including ransomware, phishing, rootkits, viruses, and more. https://www.techrepublic.com/videos/cybersecurity-now-tops-the-global-risk-barometer As malware threats increase in number and frequency, the next big attack could be looming just beyond the [...]

How businesses can keep their employees safe online

February 12th, 2018|0 Comments

From social media to online banking to email, Secure Anchor CEO Eric Cole explains how employee web activity can compromise your company's network. https://www.techrepublic.com/videos/how-businesses-to-keep-their-employees-safe-online-at-work/ Unfortunately, humans can be a significant threat vector. TechRepublic spoke with [...]

Hackers are now attacking Cisco ASA VPN bug

February 9th, 2018|0 Comments

Cisco researchers are now aware of attempted attacks leveraging a vulnerability in its Adaptive Security Appliance. https://www.techrepublic.com/videos/video-interview-the-biggest-enterprise-cybersecurity-red-flags/ A major vulnerability affecting Cisco's Adaptive Security Appliance is now under attack by hackers, according to Cisco. Companies [...]

Why it’s important to avoid FUD fatigue and threat rigidity when making security decisions

February 5th, 2018|0 Comments

Crying wolf to elicit a certain response is poor cybersecurity, contributing to a phenomenon called threat rigidity. Here's advice on successfully guiding your organization through a security incident. https://www.techrepublic.com/videos/video-best-practices-for-bridging-the-cybersecurity-communication-gap/ Relying on Fear, Uncertainty, and Doubt [...]

Here are the ‘most clicked’ phishing email templates that trick victims

January 29th, 2018|0 Comments

Wombat's state of phishing report shows that attack rates remain steady, but there is some good news: User Click rates have dropped. https://www.techrepublic.com/videos/phishing-attacks-remain-a-top-tactic-for-targeting-cyberattacks-at-business/ The most successful phishing attacks are now consumer focused, instead of business [...]

How the private sector and US government can work together to defend against cyberattacks

January 26th, 2018|0 Comments

Sharing information about cyberthreats that face both private corporations and the government can benefit both institutions, according to attorney and former CIA case officer Jack Rice. https://www.techrepublic.com/videos/how-us-companies-can-defend-against-cyberattacks-from-state-actors/ TechRepublic's Dan Patterson spoke to attorney and former [...]

Cybersecurity incidents top the 2018 Allianz Risk Barometer as second largest concern

January 22nd, 2018|0 Comments

Data breaches, malware, and ransomware attacks are now a primary concern for SMBs and enterprise companies, says Allianz cybersecurity chief Jenny Soubra. https://www.techrepublic.com/videos/cybersecurity-now-tops-the-global-risk-barometer/ Cybersecurity incidents now rank as number two on the Allianz Risk Barometer, a [...]

Report: Only 40% of data stored in cloud secured with encryption, key management

January 17th, 2018|0 Comments

Organizations globally lack clear policies around securing data in the cloud, according to Gemalto and the Ponemon Institute. https://www.techrepublic.com/videos/business-leaders-must-change-their-security-posture-to-remain-safe-in-the-cloud/ Only 40% of the data stored in the cloud is secured with encryption and key management [...]

Why your next contactless credit card might have a fingerprint scanner built-in

January 9th, 2018|0 Comments

Contactless credit cards that utilize biometrics, like one recently launched by Gemalto, may help prevent identity theft. https://www.techrepublic.com/videos/video-how-to-protect-your-company-from-internal-cyber-threats/ Building a slide deck, pitch, or presentation? Here are the big takeaways: Gemalto launched a contactless credit [...]

Why cybersecurity in 2018 will be an AI vs. AI slugfest

January 9th, 2018|0 Comments

Cybercriminals will soon rely on machine learning and other AI-based attacks to hammer corporate systems and imitate human behavior, says IBM Security's Caleb Barlow. https://www.techrepublic.com/videos/why-cybersecurity-in-2018-will-be-an-ai-vs-ai-slugfest/ In 2018, we will see a rise in artificial intelligence-powered [...]

Vocal disguises and impersonations may fool voice recognition authentication

January 2nd, 2018|0 Comments

Research indicates that impersonating a voice can fool voice recognition authentication systems. Multimodal biometric authentication might be a better security option. https://www.techrepublic.com/videos/cybersecurity-in-an-iot-and-mobile-world-3-big-factors/ Pundits predict that biometrics will eventually replace passwords as the preferred method of authenticating users. [...]

The 20 worst passwords of 2017: Did yours make the list?

December 22nd, 2017|0 Comments

Despite all of the year's major hacks, people still can't seem to let passwords like 'admin' and '123456' go. https://www.techrepublic.com/videos/video-why-all-passwords-are-bad-passwords/ For the fourth consecutive year, "123456" and "password" topped the list of leaked passwords. —SplashData, [...]

Warning: Cyber breaches more likely over holiday break

December 18th, 2017|0 Comments

Some 28% of employees have never received cybersecurity training. Here's how to help them stay safe while on holiday break. https://www.techrepublic.com/videos/video-business-cybersecurity-trends-to-expect-in-2018/ Building a slide deck, pitch, or presentation? Here are the big takeaways: 24% of [...]

The evolution of ransomware: Get ready for more advanced social engineering tactics

December 15th, 2017|0 Comments

Prepare your company for more sophisticated, complex, and devastating ransomware attacks in 2018, says Avecto COO Andrew Avanessian. https://www.techrepublic.com/videos/the-evolution-of-ransomware-get-ready-for-more-of-the-same/ Ransomware became a massive nuisance for enterprises, SMBs, and consumers in 2017—and that threat is not going [...]

99% of office workers threaten their company’s cybersecurity

December 13th, 2017|0 Comments

Minor actions, like reusing passwords, suggest workers may prioritize convenience over enterprise security, a new report said. https://www.techrepublic.com/videos/video-adopting-a-human-centric-approach-to-cyber-defense/ Virtually all office workers—99%—admit to making at least one action that could threaten a company's cybersecurity, a new [...]

20 must-read TechRepublic downloads about IT jobs, Office tips, security basics, and more

December 8th, 2017|0 Comments

Check out these TechRepublic PDF downloads to read investigative reports, in-depth special features, productivity tips, and career advice. https://www.techrepublic.com/videos/what-humans-can-do-better-than-algorithms-and-vise-versa/ In addition to keeping up with the day-to-day news that business and technology leaders need to [...]

You shouldn’t change domain controller network settings, but here’s how to do it if you must

December 8th, 2017|0 Comments

Changing network settings on a domain controller can be a risky ordeal. It's best avoided, but if you must do it make sure to follow these tips. https://www.techrepublic.com/videos/video-microsoft-gives-a-green-light-to-stronger-windows-security/ Active Directory domain controllers (DCs) are probably [...]

AWS to increase enterprise security with private endpoint option

November 29th, 2017|0 Comments

The new AWS PrivateLink feature lets SaaS developers build private endpoints to access the service. https://www.techrepublic.com/videos/video-how-to-overcome-employee-resistance-to-new-cybersecurity-policies/ Amazon Web Services (AWS) will let Software as a Service (SaaS) application developers offer private endpoints, the company announced [...]

Android users: Google is collecting your location data even if location services are off

November 21st, 2017|0 Comments

As long as you're accessing the internet on an Android device, Google can figure out where you are, a new Quartz investigation found. https://www.techrepublic.com/videos/video-everything-business-needs-to-know-about-android-8-oreo/ Android phones are collecting users' location information, even when location services [...]

The future of cyberwar: ​Weaponised ransomware, IoT attacks and a new arms race

November 15th, 2017|0 Comments

Now that cyberwarfare is out of the shadows, here's a taste of what is coming next. https://www.techrepublic.com/videos/video-hackers-are-stealing-data-from-critical-infrastructure/ After at least a dozen years in the shadows, cyberwarfare is gradually emerging into daylight. While cyber weapons were mostly [...]

Don’t click that! How to spot an invoice impersonation attack that pretends to be from a coworker

November 10th, 2017|0 Comments

Invoice impersonation attacks are on the rise, attempting to download malware that steals victims' credentials. https://www.techrepublic.com/videos/video-how-protect-your-employees-from-phishing-and-pretexting-attacks/ Finance workers are seeing a wave of phishing attacks that send victims a link to a fake invoice that [...]

Why UN cybercrime chief calls attacks an economic issue

November 3rd, 2017|0 Comments

Companies don't just lose valuable information after experiencing a cyberattack, they lose the public's trust as well. "This impacts people's lives," says the UN's Neil Walsh. https://www.techrepublic.com/videos/video-how-institutional-cyber-attacks-undermine-trust/ There isn't a day that goes by where [...]

3 simple Ways To Protect Your Data

November 1st, 2017|0 Comments

As passwords become easier to hack, IBM Security's Limor Kessem explains three ways your enterprise can protect itself. https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Passwords are increasingly becoming easier to hack, meaning that companies must take new actions to protect [...]

Microsoft’s October Patch Batch Fixes 62 Flaws

October 30th, 2017|0 Comments

Microsoft on Tuesday released software updates to fix at least 62 security vulnerabilities in Windows, Office and other software. Two of those flaws were detailed publicly before yesterday’s patches were released, and one of them is already being exploited [...]

Shark Tank’s Robert Herjavec: Cybersecurity at work is everyone’s responsibility

October 27th, 2017|0 Comments

The investor and founder of cybersecurity firm Herjavec Group spoke with TechRepublic about the biggest threats facing businesses, and how all employees can get involved in security. https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Despite the critical nature of cybersecurity, it [...]

Do These 3 Things To Keep Yourself And Your Company Cyber-Secure

October 25th, 2017|0 Comments

https://www.techrepublic.com/videos/video-america-is-not-prepared-for-a-massive-escalation-of-cyberattacks/ Jenny Soubra, Head of Cybersecurity for Allianz, explains the steps small and middle market businesses can take to ensure they are prepared to mitigate data breaches, ransomware attacks, and infrastru... https://www.techrepublic.com/videos/video-do-these-3-things-to-keep-yourself-and-your-company-cyber-secure/ Limor Kessem, Executive [...]

Nearly Undetectable Microsoft Office Exploit Installs Malware Without An Email Attachment

October 25th, 2017|0 Comments

Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines with very little means of detection. https://www.techrepublic.com/videos/video-how-to-enable-ransomware-protection-in-the-windows-10-fall-creators-update/ A newly discovered Microsoft [...]

Malware Campaign Targets Security Researchers With Bogus Cyber Conference Document

October 23rd, 2017|0 Comments

Hackers Group 74 are using fake messages from the Cyber Conflict US conference to infect cybersecurity experts with malware, according to a new report from Cisco Talos. https://www.techrepublic.com/videos/video-five-free-anti-malware-tools-that-can-help-foil-the-bad-guys/   Cybersecurity workers, beware: A new malicious [...]

Survey Shows Most Workers Misunderstand Cybersecurity: How To Improve Awareness In Your Organization

October 20th, 2017|0 Comments

A 2017 report from Wombat Security revealed that most US workers don't understand concepts like ransomware and Wi-Fi security. These tips will help you improve user cybersecurity awareness. https://www.techrepublic.com/videos/video-how-to-protect-your-company-from-internal-cyber-threats/ A User Risk Report released by Wombat Security [...]

How To Keep Your WordPress Site Secure

October 18th, 2017|0 Comments

SiteLock president Neill Feather explains simple ways the 74 million websites powered by WordPress can remain secure. https://www.techrepublic.com/videos/video-how-to-prevent-your-wordpress-site-from-getting-hacked/ Open source software like WordPress has a reputation for beingless secure than closed source, and that's not [...]

Google Chrome Adds 3 New Antivirus Protections, Improving Security For Windows Users

October 18th, 2017|0 Comments

The new settings, introduced in Chrome for Windows, protect users from hijacked settings, unwanted software, and changes that could impact the user experience. https://www.techrepublic.com/videos/how-to-use-chrome-extensions-to-improve-twitter/ Chrome for Windows users have three new antivirus features for safer [...]

How To Protect Your Windows 10 PC From Ransomware With The Fall Creators Update

October 18th, 2017|0 Comments

The Windows 10 Fall Creators Update includes an amazing new feature: Folder protection against ransomware. Here's how to activate this essential security feature. https://www.techrepublic.com/videos/video-how-to-enable-ransomware-protection-in-the-windows-10-fall-creators-update/ 3 must-have security features in the Windows 10 Fall Creators Update [...]

DHS Orders Federal Agencies To Bolster Cybersecurity With HTTPS, Email Authentication

October 18th, 2017|0 Comments

The US Department of Homeland Security will require federal agencies to use web and email encryption practices to enhance their security posture. https://www.techrepublic.com/videos/why-government-is-either-first-or-last-in-new-technology/ On Monday, the US Department of Homeland Security announced a new requirement for federal [...]

Sweeping Wi-Fi Security Flaw Has Left Nearly Every Connected Device At Risk

October 18th, 2017|0 Comments

A WPA2 security flaw known as KRACK breaks down the common security protocol, leaving nearly every Wi-Fi-connected device at risk for data theft or hacking. https://www.techrepublic.com/videos/how-can-cybersecurity-professionals-get-better-they-need-to-think-like-hackers/ Nearly all modern, protected Wi-Fi networks and the devices [...]

How To Protect Your Systems From Newly-Discovered Dnsmasq Vulnerabilities

October 13th, 2017|0 Comments

Google recently discovered seven vulnerabilities in DNS software Dnsmasq. Here's how to protect your company's operating systems, IoT, and networking devices. http://www.techrepublic.com/videos/video-why-cybersecurity-solutions-are-essential-for-new-iot-products/ Google recently announced that they have discovered seven new vulnerabilities in the Domain Name System [...]

60% of Americans Want To Live In A Smart City

October 11th, 2017|0 Comments

A CompTIA report shows that 6 in 10 US citizens are interested in living in a smart city, despite concerns about cybersecurity and budgetary constraints. http://www.techrepublic.com/videos/smart-cities-need-a-robust-cyber-workforce-to-support-iot-and-ai/ The lure of living in a technologically advanced community [...]

Passwords As We Know Them Are Dying, Here’s What Will Take Their Place

October 4th, 2017|0 Comments

Weak passwords offer many hackers an entry point into enterprises. Here's what the future of security will look like. http://www.techrepublic.com/videos/video-can-big-data-and-machine-learning-kill-two-factor-authentication/ As employees remain the no. 1 cause of company data breaches, it's key for security leaders to [...]

7 Windows 10 Security Features That Could Help Prevent Cyberattacks Against Your Business

September 29th, 2017|0 Comments

With ransomware and spyware on the rise, enterprises need to stay vigilant to protect data from attackers. Here are some native Windows 10 security features that can help. http://www.techrepublic.com/videos/video-here-are-a-few-of-the-ways-windows-10-will-transform-in-2017/ As the cybersecurity threat landscape expands, [...]

5 Critical IT Security Questions Enterprises Need To Answer Now

September 27th, 2017|0 Comments

At Microsoft Envision, Microsoft's president and chief legal officer Brad Smith shared some tips for how companies can gut check their own security strategy. http://www.techrepublic.com/videos/video-how-to-protect-your-company-from-cybercrime/ Companies must address cybersecurity, or else "sentence ourselves to a [...]

Nearly 50% Of Organizations Willing To Pay Extra For Security Guarantee From Cloud Vendors

September 25th, 2017|0 Comments

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found. http://www.techrepublic.com/videos/the-difference-between-hybrid-cloud-public-cloud-and-private-cloud/ Even though many businesses move to the cloud [...]

Report: 99% of Ransomware Targets Microsoft Products

September 22nd, 2017|0 Comments

A new report from Carbon Black analyzed 1,000 ransomware samples to learn how attackers are using it and how threats are evolving. http://www.techrepublic.com/videos/video-so-your-company-was-hit-with-ransomware-now-what/ The explosive growth of ransomware is bad news for Windows users. Some [...]

Cheat Sheet: How To Become A Cybersecurity Pro

September 22nd, 2017|0 Comments

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. http://www.techrepublic.com/videos/video-how-to-jumpstart-your-cybersecurity-career/ As cybercriminals [...]

Using Malware And Infrared Light, Hackers Can Turn A Security Camera Into A Business Spy

September 20th, 2017|0 Comments

The method, identified by researchers at Ben-Gurion University of the Negev, can be used to infiltrate data or perform malicious attacks. http://www.techrepublic.com/videos/strategies-for-improving-data-security-for-iot-devices/ Security researchers at Ben-Gurion University of the Negev (BGU) were able to use [...]

How To Design A Network That Meets All Of Your Users’ Needs

September 13th, 2017|0 Comments

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-tips-for-designing-your-network-to-meet-the-needs-of-different-sets-of-users/ When designing a network, organizations must cater to users' [...]

New Report Unveils Top 3 Cybersecurity Threats Facing Business Data

September 8th, 2017|0 Comments

For organizations securing sensitive data, ransomware, insider vulnerabilities, and denial of service attacks are their most-feared threats, according to a new report from the SANS and Infoblox. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-how-visa-mitigates-ddos-ransomware-and-iot-cyber-attacks/ Ransomware, insider threats, and denial of service [...]

Disruptive Cyberattacks Could Hit Energy Infrastructure in US, Europe

September 6th, 2017|0 Comments

A report from Symantec has identified the re-emergence of a hacking group called Dragonfly, which seems to be targeting the energy sector. http://www.techrepublic.comhttp://www.techrepublic.com/videos/video-what-happens-at-the-government-when-a-cybersecurity-threat-is-identified/ A new "wave of cyberattacks" could be poised to hit the energy [...]

How One Marketing Company Used A Cloud Solution To Address Project-Related Security Risks

September 1st, 2017|0 Comments

Keeping company data secure can get tricky when collaborating with remote employees and contractors. Here's how AdRoll, a marketing platform provider, addressed that issue using a cloud-based service. http://www.techrepublic.comhttp://www.techrepublic.com/videos/5-things-to-know-about-cloud-security/ Security risks are not new in [...]

Google pays $10,000 for student’s bug

August 16th, 2017|0 Comments

Google has rewarded a Uruguayan student with $10,000 after he exposed a security flaw that could allow hackers to access sensitive data. Ezequiel Pereira discovered the vulnerability in Google’s App Engine server after changing the [...]

Flash Player is Dead, Long Live Flash Player!

August 7th, 2017|0 Comments

Adobe last week detailed plans to retire its Flash Player software, a cross-platform browser plugin so powerful and so packed with security holes that it has become the favorite target of malware developers. To help eradicate this ubiquitous [...]

Why you should view torrents as a threat

August 2nd, 2017|0 Comments

Despite their popularity among users, torrents are very risky “business”. Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to [...]

Analysis of TeleBots’ cunning backdoor

July 5th, 2017|0 Comments

On the 27th of June 2017, a new cyberattack hit many computer systems in Ukraine, as well as in other countries. That attack was spearheaded by the malware ESET products detect as Diskcoder.C(aka ExPetr, PetrWrap, Petya, or NotPetya). This [...]

Botnets overshadowed by ransomware (in media)

June 7th, 2017|0 Comments

Recently, the much-reported WannaCryptor ransomware attack took the media by storm, receiving considerably more coverage than might have been expected for this type of malware, and overshadowing other internet threats at the same time. More dangerous than [...]

Malicious registry keys: Reflective injection

May 15th, 2017|0 Comments

Over the years, we have witnessed how cybercriminals have developed and implemented sophisticated new techniques to outwit users. That being said, one thing has not changed and remains a constant challenge: ensuring perseverance and avoiding detection both [...]

Beware Google Docs phishing attack

May 4th, 2017|0 Comments

Recently, many people received a phishing email from a mailinator.com address that was attached to a malicious Google doc. It seemed to be targeting journalists, as well as yours truly. Once the link is clicked, [...]

Scam calls: Can you hear me, mother?

April 26th, 2017|0 Comments

Sandy Powell was a Yorkshire-born comedian who was well known for the catchphrase ‘Can you hear me, mother?’, with which he used to introduce his radio shows. It may not sound particularly amusing nowadays, but [...]

Alleged Spam King Pyotr Levashov Arrested

April 10th, 2017|0 Comments

Authorities in Spain have arrested a Russian computer programmer thought to be one of the world’s most notorious spam kingpins. Spanish police arrested Pyotr Levashov under an international warrant executed in the city of Barcelona, according to [...]

The right to privacy in the digital era

April 3rd, 2017|0 Comments

Discussions around personal data protection in the European Union have drawn attention to the right of citizens to secure their privacy, a right that has been a constant concern over the years. This is especially [...]

GDPR: A simple explainer

March 24th, 2017|0 Comments

The General Data Protection Regulation (GDPR) is the biggest change in data protection laws for 20 years, and when it comes into effect on May 25th, 2018, it intends to give European citizens back control [...]

ABTA experiences data breach

March 21st, 2017|0 Comments

The Association of British Travel Agents (ABTA) has suffered a major data breach, affecting thousands of customers. As some news providers have observed, it took the UK’s largest holiday and travel association 16 days to [...]

Adobe, Microsoft Push Critical Security Fixes

March 15th, 2017|0 Comments

Adobe and Microsoft each pushed out security updates for their products today. Adobe plugged at least seven security holes in its Flash Player software. Microsoft, which delayed last month’s Patch Tuesday until today, issued an unusually large [...]