Information security

[ follow ]
TechRepublic
9 hours ago
Information security

Review Methodology for Password Managers

Detailed breakdown of TechRepublic's password manager review process. [ more ]
TechRepublic
4 hours ago
Information security

Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

The number of devices infected with data-stealing malware in 2023 was 9.8 million, with an expected rise to 16 million; infostealers are on the rise due to ease of access. [ more ]
TechRepublic
1 day ago
Information security

Data Encryption Policy | TechRepublic

Data Encryption Policy aims to define encryption requirements for all organization devices to prevent unauthorized access. [ more ]
TechRepublic
3 days ago
Information security

TechRepublic's Review Methodology for VPNs

TechRepublic evaluates VPNs based on five main categories: pricing, core VPN features, ease of use, customer support, and expert analysis, each weighted differently in the assessment process. [ more ]
TechRepublic
6 days ago
Information security

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Backups do not guarantee safety from ransomware attacks; compromised backups significantly increase the likelihood of paying ransom and recovery costs. [ more ]
TechRepublic
6 days ago
Information security

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple warned iPhone users of targeted mercenary spyware attacks, advising expert help for affected users. [ more ]
New Relic
6 days ago
Information security

Identify vulnerabilities across application environments

Securing application environments is essential for operational security, compliance, and customer trust, requiring identification and mitigation of vulnerabilities through detailed understanding and effective strategies. [ more ]
TechRepublic
1 week ago
Information security

Checklist: Securing Digital Information | TechRepublic

Digital information is crucial for organizations, and the checklist offers a strategy for maximum security. [ more ]
TechRepublic
1 week ago
Information security

Cybersecurity: Benefits and Best Practices | TechRepublic

Cybercriminal activity is increasing.It is no longer a matter of if an attack will happen, but of when.
security
TechRepublic
1 week ago
Information security

4 Best Open Source Password Managers for Teams in 2024

Password managers are crucial for secure credential storage, sharing, and access.
Open source password managers offer code customization, easy vulnerability detection, and transparency. [ more ]
TechRepublic
1 week ago
Information security

6 Best Open Source Password Managers for Mac in 2024

MacPass is the best overall open-source password manager for macOS users.
Open source password managers ensure transparency and control over data for enhanced security and privacy. [ more ]
TechRepublic
1 week ago
Information security

6 Best Open Source Password Managers for Windows in 2024

Bitwarden is the best overall open-source password manager for Windows.
Different password managers excel in security, data protection, offline management, storage, collaboration, and being free. [ more ]
TechRepublic
2 weeks ago
Information security

5 Best Password Managers for Android in 2024

Android accounts for 70.1% of mobile operating systems worldwide in Q4 2023.
Password managers on Android enhance security by encrypting and organizing passwords. [ more ]
TechRepublic
3 weeks ago
Information security

6 Best Authenticator Apps for 2024

Authenticator apps add security against identity-related breaches.
Google Authenticator provides locally generated time-based passcodes for offline authentication support. [ more ]
moresecurity
TechRepublic
1 week ago
Information security

Cyber Insurance Policy | TechRepublic

Cyber threats are increasing, leading to financial losses that companies need to mitigate.
The policy covers various cyber-related incidents, such as unauthorized access to bank accounts and fraudulent transactions. [ more ]
microsoft
ComputerWeekly.com
1 week ago
Information security

Patch Tuesday: Windows Server 2008 receives emergency security patch | Computer Weekly

Microsoft's latest Patch Tuesday in April 2024 addresses 155 vulnerabilities, including 3 critical ones and 145 important severity ones.
An emergency patch for the Proxy Driver Spoofing Vulnerability impacting Windows desktop and server OS was released for end-of-life versions like Windows Server 2008. [ more ]
Zero Day Initiative
1 week ago
Information security

Zero Day Initiative - The April 2024 Security Updates Review

Adobe released nine patches addressing 24 CVEs in various products, including critical and important-severity bugs.
Microsoft released 147 new CVEs this month in Microsoft Windows and Windows Components. [ more ]
Theregister
1 week ago
Information security

Microsoft security bypass bug said to be under exploit

Microsoft fixed 149 security flaws on Patch Tuesday.
A vulnerability, CVE-2024-26234, was actively exploited with a backdoor in Windows. [ more ]
moremicrosoft
TechRepublic
1 week ago
Information security

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies | TechRepublic

Cyber threat hunting aims to detect malicious activities and enhance an organization's resilience against attacks.
Hypothesis-driven hunting involves forming assumptions based on threat intelligence to uncover potential security breaches. [ more ]
TechRepublic
1 week ago
Information security

TechRepublic Academy Is Offering Extra 20% Off Most Deals Through 4/16

Opportunity to get 20% extra discount on site-wide sales at TechRepublic Academy.
TechRepublic Academy offers a wide range of technology deals, online training, and electronics to enhance business operations or personal career growth. [ more ]
TechRepublic
1 week ago
Information security

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

XZ Utils is widely used in Unix-based systems like Linux for data compression.
The XZ backdoor allowed remote code execution via SSH login certificates and affected versions 5.6.0 and 5.6.1. [ more ]
TechRepublic
1 week ago
Information security

Get an Extra 20% Off a Lifetime of Powerful VPN Protection Through 4/7

Protect business data with a lifetime subscription to OysterVPN for $32 using code SECURE20 through April 7.
OysterVPN offers secure connections to over 182 servers across 22 countries, unlimited data on five connections, and advanced features like encryption and ad blocking. [ more ]
TechRepublic
2 weeks ago
Information security

Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7

Ransomware threats in Asia-Pacific vary by jurisdiction and sector
Intelligence on specific attack trends can enhance ransomware defense [ more ]
TechRepublic
2 weeks ago
Information security

9 Must-Do Tips to Secure Ubuntu Server | TechRepublic

Constantly secure servers to stay ahead of hackers, even as a Linux systems administrator.
Linux platforms like Ubuntu still require hardening measures to prevent compromises. [ more ]
TechRepublic
2 weeks ago
Information security

Get a Lifetime of VPN Protection for Just $16

Get a lifetime subscription to RealVPN for $16 with promo code SECURE20 until April 7th.
RealVPN offers encryption for all data, access to multiple servers worldwide, and can connect up to five devices simultaneously. [ more ]
TechRepublic
2 weeks ago
Information security

What Is a VPN Kill Switch and Why Do You Need One?

Virtual Private Network (VPN) kill switch benefits include protecting sensitive data, preventing account compromise, and ensuring privacy from censorship.
VPN kill switch drawbacks include frequent disconnections, the requirement of an always-on VPN, and crashes that disable internet access. [ more ]
TechRepublic
2 weeks ago
Information security

Top 6 Passwordless Authentication Solutions for 2024

Passwordless authentication methods include biometrics, smart cards, and mobile apps, improving security and user experience.
Passwordless authentication solutions are part of larger IAM platforms, integrating with other applications for enhanced security measures. [ more ]
Theregister
3 weeks ago
Information security

JetBrains fixes 26 'security problems,' offering no details

JetBrains urged users to upgrade due to 26 security issues in TeamCity.
JetBrains declined to disclose details for security fixes. [ more ]
TechRepublic
3 weeks ago
Information security

Protect Your Business With This Seamless Firewall for $50

DNS FireWall offers a cost-effective solution for cybersecurity protection.
DNS FireWall uses machine learning to proactively block malware, phishing, and botnets. [ more ]
CyberScoop
3 weeks ago
Information security

US and UK accuse China of cyber operations targeting domestic politics

U.S. government accuses Chinese nationals of hacking operation targeting political targets in the U.S.
Indictment unveiled against Chinese group for breaching personal devices of U.S. officials, dissidents, and companies. [ more ]
TechRepublic
3 weeks ago
Information security

Microsoft: 87% of UK Businesses Are Unprepared for Cyberattacks

Only 13% of UK businesses are resilient to cyberattacks, 87% are at risk.
AI in cybersecurity can increase resilience and reduce costs for organizations. [ more ]
TechRepublic
3 weeks ago
Information security

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

GoFetch vulnerability affects Apple's M1, M2, and M3 chips, allowing exfiltration of keys from cryptographic applications.
The vulnerability resides in Data Memory-dependent Prefetchers in the chips, exploiting behavior that confuses memory content with pointer values to guess secret keys. [ more ]
Theregister
3 weeks ago
Information security

Uncle Sam has had enough of SQL injection vulnerabilities

US authorities urge software vendors to conduct formal code reviews to eliminate SQL injection vulnerabilities.
Customers advised to hold vendors accountable by asking about mitigation measures for SQL injection exploits. [ more ]
Exponential-e Ltd.
3 weeks ago
Information security

Ransomware: lessons all companies can learn from the British Library attack

The British Library faced a major cyber incident with data encryption and exfiltration by Rhysida ransomware gang.
British Library refused to pay ransom, emphasizing adherence to the UK's policy against such payments. [ more ]
Theregister
3 weeks ago
Information security

Vans says cyber crooks didn't nab customers' financial info

35.5 million customers notified of identity threat
No evidence of credit card or bank account details stolen [ more ]
WIRED
3 weeks ago
Information security

Apple Chip Flaw Leaks Secret Encryption Keys

Hotel room locks worldwide vulnerable to intrusion technique
Privacy concerns include Apple's iMessage encryption and data sharing by websites. [ more ]
TechRepublic
3 weeks ago
Information security

JumpCloud vs Okta (2024): IAM Software Comparison

Identity and access management software is crucial for network security.
JumpCloud and Okta are significant players in the IAM space. [ more ]
InfoQ
3 weeks ago
Information security

Google Cloud Launches Security Command Center Enterprise

Security Command Center Enterprise integrates Mandiant expertise and Generative AI for proactive and simplified cloud security.
The solution bridges the gap between cloud security and enterprise security operations, enabling organizations to manage and prioritize cloud risk effectively. [ more ]
TechRepublic
4 weeks ago
Information security

6 Best Multi-Factor Authentication (MFA) Solutions for 2024

Google Authenticator for individuals
Cisco Duo for small to medium-sized businesses
Auth0 for startups and nonprofits [ more ]
siliconvalleyjournals.com
4 weeks ago
Information security

Sevco Security Achieves Remarkable Growth and Secures $17M in New Funding

Sevco Security experiences significant growth in 2023 driven by product enhancements and customer adoption
Challenges in traditional enterprise asset detection lead to increased demand for innovative solutions like Sevco's CAASM platform [ more ]
DevOps.com
4 weeks ago
Information security

DevSecOps: 5 Tips for Developing Better, Safer Apps - DevOps.com

Cloud attacks are increasing with a 95% surge in 2022, emphasizing the critical importance of security in the cloud.
DevOps teams play a crucial role in addressing security concerns through early detection and prevention measures. [ more ]
Coindesk
4 weeks ago
Information security

North Korean Crypto Hackers Have Stolen $3B Since 2017, Says UN Security Council: Report

North Korea-linked cryptocurrency hacks totaled $3 billion between 2017 and 2023.
UN Security Council panel investigating 17 crypto heists in 2023 valued at over $750 million. [ more ]
The Verge
4 weeks ago
Information security

Cyberattacks are targeting US water systems, warns EPA and White House

Water and wastewater systems are vulnerable to cyberattacks due to lack of resources for cybersecurity practices.
Biden administration urges states to enhance security measures for critical water infrastructure against disabling cyberattacks. [ more ]
CyberScoop
4 weeks ago
Information security

White House, EPA warn water sector of cybersecurity threats

Attacks on water systems are increasing in the U.S.
EPA is establishing a cybersecurity task force for water utilities. [ more ]
Theregister
4 weeks ago
Information security

US task force aims to plug security leaks in water sector

US government is urging states to enhance cybersecurity in the water sector.
A Water Sector Cybersecurity Task Force is being established to address vulnerabilities and adopt best practices. [ more ]
TechRepublic
4 weeks ago
Information security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Employees in Asia-Pacific take security risks despite knowing they are risky.
Japanese employees exhibit better cybersecurity behavior, possibly due to cultural values. [ more ]
Ars Technica
4 weeks ago
Information security

Critical US water systems face "disabling cyberattacks," White House warns

Water utilities facing disabling cyberattacks by foreign nations
Specific incidents of cyberattacks on water facilities [ more ]
TechRepublic
1 month ago
Information security

Keep Your Data Safe and Become More Productive for Just $30

Microsoft Windows 10 Pro increases productivity and efficiency for business users.
Windows 10 Pro offers enhanced security features like Windows Hello and BitLocker. [ more ]
TechCrunch
4 weeks ago
Information security

Pokemon resets some users passwords after hacking attempts | TechCrunch

Pokemon Company detected hacking attempts and reset affected user passwords.
Only 0.1% of targeted accounts were compromised, a similar tactic to credential stuffing. [ more ]
BleepingComputer
4 weeks ago
Information security

Fujitsu found malware on IT systems, confirms data breach

Fujitsu discovered malware on systems, leading to customer data theft.
Fujitsu has informed authorities and customers about the incident and is investigating the data breach. [ more ]
Forbes
4 weeks ago
Information security

Council Post: A New Approach To Cloud Security For 2024

Companies face new challenges and risks while reinventing themselves in the cloud.
Mitigating cyber risks is a top priority for the C-suite, with a focus on cloud security. [ more ]
Graham Cluley
1 month ago
Information security

Fujitsu hack raises questions, after firm confirms customer data breach

Fujitsu discovered malware on its systems potentially leading to data theft
Lack of transparency in Fujitsu's disclosure about the cyberattack [ more ]
Theregister
1 month ago
Information security

Fujitsu: Miscreants deployed malware on our systems

Fujitsu confirmed internal computers compromised with malware and potential customer information theft.
Fujitsu taking steps to investigate breach, notify affected individuals, and enhance security measures. [ more ]
Theregister
1 month ago
Information security

133k+ Fortinet appliances still vulnerable to CVE-2024-21762

Vulnerable Fortinet appliances
High number of exposures [ more ]
TechRepublic
1 month ago
Information security

6 Best VPNs for Gaming in 2024

The video game industry revenue surpasses film and music industries combined in 2022.
VPNs play a crucial role in providing security and accessing geo-blocked content for gamers and gaming businesses. [ more ]
TechRepublic
1 month ago
Information security

Get on CompTIA Certification Track With These $30 Study Guides

Invest in IT certifications to enhance business potential
Comprehensive study guides available for various certification exams at a discounted price of $29.99. [ more ]
CyberScoop
1 month ago
Information security

Health care groups resist cybersecurity rules in wake of landmark breach

Cyberattack on payment processor affects healthcare system
Debate on implementing cybersecurity regulations for healthcare sector [ more ]
CyberScoop
1 month ago
Information security

Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new?

Chinese hacking operations targeting critical infrastructure are not surprising to experts.
Many cybersecurity experts view Chinese hacking as the status quo. [ more ]
TechRepublic
1 month ago
Information security

5 Benefits of Passwordless Authentication

Passwordless technology is on the rise to combat password overload and security risks.
Benefits of going passwordless include cost savings, improved productivity, and enhanced security. [ more ]
CyberScoop
1 month ago
Information security

FCC approves cybersecurity label for consumer devices

The U.S. Cyber Trust Mark is a voluntary label for IoT security standards.
Consumers may influence product security standards through the Trust Mark program. [ more ]
TechRepublic
1 month ago
Information security

MFA vs 2FA: Which Is Best for Your Business?

Breaches are common, phishing scams prevalent, AI aids cybercrime.
Phishing is a major attack vector, MFA and 2FA enhance security. [ more ]
TechRepublic
1 month ago
Information security

Sophos: Cyber Security Professional Burnout Is Widespread, Creating Risk for APAC Organisations

Cybersecurity professionals in APAC are experiencing burnout at high rates due to factors like alert fatigue and lack of resources.
Organizational acknowledgment of burnout impacting productivity, employee retention, and potential future support from AI. [ more ]
TechRepublic
1 month ago
Information security

5 Best VPNs for Travel in 2024 (Free & Paid VPNs)

Using work laptops while traveling may pose security risks on public Wi-Fi networks or with geo-blocking challenges.
Virtual Private Networks (VPNs) are important for travelers to protect sensitive company data and access restricted content. [ more ]
TechCrunch
1 month ago
Information security

How to verify a data breach | TechCrunch

Verification of data breaches is crucial for both companies and victims to take prompt action.
Authenticating data breaches involves utilizing various tools and techniques tailored to each unique breach. [ more ]
Hot for Security
1 month ago
Information security

Leak of Acer Philippines employee database appears on hacking forum

Employee data of Acer Philippines leaked after a third-party vendor breach.
Attacker provided stolen employee data for free, possibly with no intent to monetize. [ more ]
CyberScoop
1 month ago
Information security

What resources do small utilities need to defend against cyberattacks?

Small utilities face cyberattack risks
Limited resources hinder small utilities' cybersecurity [ more ]
[ Load more ]