When working from home, it’s important to understand the security risks. Tom Merritt lists five remote access threats so you can secure your system. Advertise on IT Security News. Read the complete article: Top 5 remote access threats
Tag: Security on TechRepublic
How to use an iPhone or Android device as the security key for your Google account
Your smartphone can act as your security key to authenticate your Google credentials on the web. Learn how to set that up on an Android device or an iPhone. Advertise on IT Security News. Read the complete article: How…
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
How to protect your organization and remote workers against ransomware
Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services. Advertise on IT Security News. Read the complete article: How to protect…
How to create a Kubernetes security policy
If you’re looking to take your Kubernetes security to the next level, you’ll want to start working with pod security policies. Here’s a quick introduction to this feature. Advertise on IT Security News. Read the complete article: How to…
How to listen to port traffic on a Linux server
Every network administrator needs to know how to listen to port traffic on a server. Here’s one way to do it on Linux. Advertise on IT Security News. Read the complete article: How to listen to port traffic on…
Cybercriminals attack KEEN shoe drive for people affected by coronavirus pandemic
KEEN is providing shoes to people most impacted by the COVID-19 pandemic, but their website was bombarded by malicious bots. Advertise on IT Security News. Read the complete article: Cybercriminals attack KEEN shoe drive for people affected by coronavirus…
How to enable 2FA for groups in Nextcloud
Nextcloud allows you to enforce groups to use two-factor authentication. Let’s find out how to create a group and then add them to 2FA enforcement. Advertise on IT Security News. Read the complete article: How to enable 2FA for…
Why Microsoft’s Office 365 has become an all-access pass for phishers to exploit
Cybercriminals are tapping into the widespread use of Office 365 to spread malware in an attempt to steal account credentials, according to email security provider Vade Secure. Advertise on IT Security News. Read the complete article: Why Microsoft’s Office…
How to sync Firefox containers across devices
If you make use of the Firefox Multi-Container Account add-on, it now includes the ability to sync your customizations across your Firefox account. Advertise on IT Security News. Read the complete article: How to sync Firefox containers across devices
How hospitals can be proactive to prevent ransomware attacks
The coronavirus is putting a strain on healthcare facilities and increasing cybersecurity risks. Here are steps hospital IT admins can take to prevent ransomware and safeguard patient data. Advertise on IT Security News. Read the complete article: How hospitals…
667% spike in email phishing attacks due to coronavirus fears
New data from Barracuda shows cybercriminals are taking advantage of people’s concerns during the COVID-19 pandemic. Advertise on IT Security News. Read the complete article: 667% spike in email phishing attacks due to coronavirus fears
How to safely work from home during the coronavirus outbreak
A malware expert offers telecommuters security tips about their work computer, remote access and network connections, phishing emails, and more. Advertise on IT Security News. Read the complete article: How to safely work from home during the coronavirus outbreak
Hackers hijacking home routers to direct people to malicious coronavirus app
The attackers are changing DNS settings on Linksys routers to redirect users to a malicious website promising an informative COVID-19 app, says security provider BitDefender. Advertise on IT Security News. Read the complete article: Hackers hijacking home routers to…
How hackers are using COVID-19 fears to push new scams and malware
Cybercriminals may be staying home, but they’re not taking a break from phishing attempts and password hacking during the coronavirus outbreak. Advertise on IT Security News. Read the complete article: How hackers are using COVID-19 fears to push new…
How 4G and 5G networks are vulnerable to Denial-of-Service attacks
Existing 4G and early 5G networks use Diameter signaling protocol, which contains certain security holes that can lead to a range of attacks, says enterprise security provider Positive Technologies. Advertise on IT Security News. Read the complete article: How…
What is Microsoft Azure Sphere? Everything you need to know
Microsoft locks down the Internet of Things with its own Linux. Advertise on IT Security News. Read the complete article: What is Microsoft Azure Sphere? Everything you need to know
5 things SMB IT departments should do to survive the impact of COVID-19
The overnight transformation to telecommuting means security risks are even higher than during normal business times. Advertise on IT Security News. Read the complete article: 5 things SMB IT departments should do to survive the impact of COVID-19
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
Organizations are moving their security to the cloud, but concerns remain
Businesses see advantages in migrating to cloud-based security tools but are worried about such issues as data privacy and unauthorized access, says Exabeam. Advertise on IT Security News. Read the complete article: Organizations are moving their security to the…
Boost security defenses against Kwampirs RAT malware with new list of IOCs
ReversingLabs did a forensic analysis of attacks from the remote access trojan to understand the malware control structure. Advertise on IT Security News. Read the complete article: Boost security defenses against Kwampirs RAT malware with new list of IOCs
Infrastructure cyberattacks biggest concern for global IT security leaders
A study on industrial cybersecurity focused on the biggest security threats for the enterprise. Advertise on IT Security News. Read the complete article: Infrastructure cyberattacks biggest concern for global IT security leaders
Data-layer security is a new imperative as employees telecommute due to coronavirus
Commentary: COVID-19 has laid bare our need to take a new, more data-centric approach to security in light of more people working from home. Advertise on IT Security News. Read the complete article: Data-layer security is a new imperative…
Coronavirus-related digital fraud: 22% of Americans targeted
A TransUnion report details how COVID-19 has impacted online shopping and fraud. Advertise on IT Security News. Read the complete article: Coronavirus-related digital fraud: 22% of Americans targeted
Hackers target World Health Organization in attempt to steal passwords
Hacking attempts against the health organization and its partners have jumped as they struggle to battle the coronavirus. Advertise on IT Security News. Read the complete article: Hackers target World Health Organization in attempt to steal passwords
Akamai adds secure web gateway capabilities to threat service
Responding to customer demand, the company is bringing something new to its Enterprise Threat Protector. Advertise on IT Security News. Read the complete article: Akamai adds secure web gateway capabilities to threat service
Top 5 tips for securely working from home
As working from home becomes more common for tech workers, ensuring proper security measures is important. Tom Merritt offers five security tips for employees working from home. Advertise on IT Security News. Read the complete article: Top 5 tips…
Microsoft Defender for Linux is coming. This is what you need to know
Microsoft’s security tools extend beyond the company’s own platforms. While the ambition for Defender for Linux is broad, the first preview is aimed just at servers and does less than on Windows. Advertise on IT Security News. Read the…
How to protect your organization and remote workers against ransomware
Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services. Advertise on IT Security News. Read the complete article: How to protect…
How to protect your organization and remote workers against ransomware
Phishing emails and unsecure remote desktop protocol access are two common types of attack methods used to spread ransomware, says cyber breach firm Beazley Breach Response Services. Advertise on IT Security News. Read the complete article: How to protect…
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
Cybercriminals now recycling standard phishing emails with coronavirus themes
The latest malicious COVID-19 campaigns are repurposing conventional phishing emails with a coronavirus angle, says security trainer KnowBe4. Advertise on IT Security News. Read the complete article: Cybercriminals now recycling standard phishing emails with coronavirus themes
Cybercriminals now recycling standard phishing emails with coronavirus themes
The latest malicious COVID-19 campaigns are repurposing conventional phishing emails with a coronavirus angle, says security trainer KnowBe4. Advertise on IT Security News. Read the complete article: Cybercriminals now recycling standard phishing emails with coronavirus themes
3 ways to revamp the hiring process for cybersecurity jobs
Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment. Advertise on IT Security News. Read the complete article: 3 ways to revamp the hiring process for cybersecurity…
3 ways to revamp the hiring process for cybersecurity jobs
Deloitte expert recommends using tactics to compete for the pool of security pros, including offering new incentives like student loan repayment. Advertise on IT Security News. Read the complete article: 3 ways to revamp the hiring process for cybersecurity…
How to deal with network security and bandwidth issues during the coronavirus pandemic
Experts discuss what precautions companies need to be taking right now that a record number of people are working outside of offices. Advertise on IT Security News. Read the complete article: How to deal with network security and bandwidth…
How to create a Kubernetes security policy
If you’re looking to take your Kubernetes security to the next level, you’ll want to start working with pod security policies. Here’s a quick introduction to this feature. Advertise on IT Security News. Read the complete article: How to…
TrickBot and Emotet strains make process injection most prevalent attack technique
A Red Canary study analyzed six million leads to determine threats and found that worms had the most significant impact in 2019. Advertise on IT Security News. Read the complete article: TrickBot and Emotet strains make process injection most…
Network address-based security: How to implement better controls
Traditional network address-based security controls aren’t as effective for the cloud or internal networks. Here’s what to do about these security issues. Advertise on IT Security News. Read the complete article: Network address-based security: How to implement better controls
Bring sanity and security to infection outbreaks with a malware response plan
Find out how to deal with a security breach and protect your data and your network from another attack using this 37-step incident response checklist. Advertise on IT Security News. Read the complete article: Bring sanity and security to…
Cybercriminals exploiting coronavirus outbreak with virus-themed sales on the dark web
Malicious COVID-19 domains and special virus-themed sales on the dark web are two ways criminals are using the outbreak to ramp up business, said security provider Check Point. Advertise on IT Security News. Read the complete article: Cybercriminals exploiting…
COVID-19 demonstrates the need for disaster recovery and business continuity plans
The coronavirus may put organizations at risk through short staffing or unavailable workers and services, but disaster recovery and business continuity plans can help sustain business operations. Advertise on IT Security News. Read the complete article: COVID-19 demonstrates the…
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
How to listen to port traffic on a Linux server
Every network administrator needs to know how to listen to port traffic on a server. Here’s one way to do it on Linux. Advertise on IT Security News. Read the complete article: How to listen to port traffic on…
Healthcare devices at higher cybersecurity risk now due to COVID-19
Much of the US healthcare system is running on outdated software and unsupported operating systems, such as Windows 7, leaving devices vulnerable to hackers who are actively exploiting the coronavirus. Advertise on IT Security News. Read the complete article:…
IT security report finds 97% have suspicious network activity
The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying. Advertise on IT Security News. Read the complete article: IT security report finds 97%…
Libya-based hackers using coronavirus pandemic to spread mobile surveillance malware
The drastic spread of coronavirus across the world has not stopped cybercriminals from exploiting fear to hack into devices. Advertise on IT Security News. Read the complete article: Libya-based hackers using coronavirus pandemic to spread mobile surveillance malware
COVID-19 brings new security challenges and new allies, says HackerOne CEO
Commentary: Even as phishing and other attacks rise in the wake of COVID-19, white-hat hackers are readying their defenses. Advertise on IT Security News. Read the complete article: COVID-19 brings new security challenges and new allies, says HackerOne CEO
How to better defend your organization against remote access threats
With people working remotely due to the coronavirus, cybercriminals are trying to take advantage of such tools as VPNs and remote desktop services, says security firm Radware. Advertise on IT Security News. Read the complete article: How to better…
How a Nigerian cybercriminal earned more than $100,000
A savvy operator in Nigeria has bought items with stolen credit cards and used phishing and malware attacks to earn a healthy income, according to cybersecurity provider Check Point. Advertise on IT Security News. Read the complete article: How…
Ransomware: A security expert explains what makes us vulnerable and how to prevent it
Ransomware attacks are still happening, and more employees need to be trained on how to prevent them. Advertise on IT Security News. Read the complete article: Ransomware: A security expert explains what makes us vulnerable and how to prevent…
How to control what personal information people see in Android
Do you know what information you share within the Google ecosystem? You can easily control what is visible or hidden, from with your Android device. Find out how. Advertise on IT Security News. Read the complete article: How to…
How to protect yourself from coronavirus-themed malware
Attackers are using phishing emails, ransomware, and malicious apps to target people curious about the virus, says security firm Cybereason. Advertise on IT Security News. Read the complete article: How to protect yourself from coronavirus-themed malware
How to protect your organization from security threats amidst the rise in telecommuters
Security becomes a greater challenge as more people work from home due to the coronavirus. Learn how to better protect your organization and employees. Advertise on IT Security News. Read the complete article: How to protect your organization from…
Cybersecurity risks grow as thousands of federal employees shift to telecommuting
The Trump administration has ordered hundreds of thousands of federal employees to be prepared to work from home full time and use VPNs to connect to government systems. Advertise on IT Security News. Read the complete article: Cybersecurity risks…
CovidLock ransomware exploits coronavirus with malicious Android app
The app promises access to a coronavirus map tracker but instead holds your contacts and other data for ransom, DomainTools found. Advertise on IT Security News. Read the complete article: CovidLock ransomware exploits coronavirus with malicious Android app
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
88% of IT pros say world is in permanent state of cyberwar
A Venafi study looked into what digital infrastructure will suffer from cyberattacks, which are most vulnerable, and what it means. Advertise on IT Security News. Read the complete article: 88% of IT pros say world is in permanent state…
How to enable 2FA on a per-user basis in Nextcloud
If you want to enable two-factor authentication for Nextcloud on a per-user basis, it’s just a simple app installation away. Advertise on IT Security News. Read the complete article: How to enable 2FA on a per-user basis in Nextcloud
Report: US Health and Human Services department hit by cyberattack amidst coronavirus fears
The Sunday cybersecurity attack was designed to slow down the agency’s systems as it tries to grapple with the spread of COVID-19. Advertise on IT Security News. Read the complete article: Report: US Health and Human Services department hit…
How hospital CIOs can prepare for the onslaught of coronavirus patients
There are steps that IT departments can take to strengthen their technical infrastructure in advance of COVID-19’s arrival at their facility. Advertise on IT Security News. Read the complete article: How hospital CIOs can prepare for the onslaught of…
Facebook cookie-stealing trojans surface on Android devices
The trojans are designed to gain control of Facebook user accounts by capturing browser cookies in Android, says Kaspersky. Advertise on IT Security News. Read the complete article: Facebook cookie-stealing trojans surface on Android devices
Nearly 300 cybersecurity incidents impacted supply chain entities in 2019
A study from Resilience360 listed cyberthreats as one of the biggest issues facing global supply chains in 2020. Advertise on IT Security News. Read the complete article: Nearly 300 cybersecurity incidents impacted supply chain entities in 2019
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on telecommuting, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article: Coronavirus:…
Cybercriminals raking in $1.5 trillion every year
Research from Atlas VPN found that criminals’ net proceeds outpace the revenue made by tech giants each year. Advertise on IT Security News. Read the complete article: Cybercriminals raking in $1.5 trillion every year
Dell: Cost of data loss per organization surpassed $1M in the past year
Businesses now manage an average of 13.53 petabytes of data, but struggle to keep it secure. Advertise on IT Security News. Read the complete article: Dell: Cost of data loss per organization surpassed $1M in the past year
Biggest trends for 5G as infrastructure to hit $4.2 billion
This year will be a big investment year for 5G for many manufacturers and network operators. Find out what the experts predict will happen next. Advertise on IT Security News. Read the complete article: Biggest trends for 5G as…
Cybersecurity pros are using artificial intelligence but still prefer the human touch
More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security. Advertise on IT Security News. Read the complete article: Cybersecurity pros are using…
February sees huge jump in exploits designed to spread Mirai botnet
The Mirai botnet is known for targeting Internet of Things devices and conducting massive DDoS attacks, as described by cyberthreat researcher Check Point Research. Advertise on IT Security News. Read the complete article: February sees huge jump in exploits…
Hackers are working harder to make phishing and malware look legitimate
A Trend Micro report finds that spammers are using public and hosted cloud infrastructure to slip malicious emails past security defenses. Advertise on IT Security News. Read the complete article: Hackers are working harder to make phishing and malware…
Trend Micro VP talks cloud security, IoT risks, and ransomware
In an interview at RSA 2020, Greg Young, the vice present of cybersecurity at Trend Micro, said that companies need to focus on cloud security posture management to make sure all cloud instances are configured correctly and securely. Advertise…
Exabeam employees at RSA tech conference in San Francisco stricken with COVID-19
The two people who tested positive for COVID-19 may have been at the company’s booth at RSA, which drew over 36,000 people to San Francisco in February. Advertise on IT Security News. Read the complete article: Exabeam employees at…
Local governments: Don’t pay ransoms to hackers
A Deloitte survey about ransomware also recommends that local governments use air-gapped system backups. Advertise on IT Security News. Read the complete article: Local governments: Don’t pay ransoms to hackers
Closing the cybersecurity gender gap would boost the US economy by $30B
82% of women in cybersecurity jobs agree the industry has a gender bias problem. Fixing it would not only improve morale and confidence, but also result in an economic boost to the cybersecurity industry. Advertise on IT Security News.…
Two attendees at RSA tech conference in San Francisco stricken with COVID-19
The organizers of the popular security conference, RSA, which drew over 36,000 people to San Francisco in February, confirmed that at least two people who attended have tested positive for COVID-19. Advertise on IT Security News. Read the complete…
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article:…
Intel’s data center CPUs vulnerability could lead to “devastating” attacks
Security researchers found vulnerabilities that can affect multi-tenant environments such as public clouds or shared enterprise workloads. Advertise on IT Security News. Read the complete article: Intel’s data center CPUs vulnerability could lead to “devastating” attacks
Cyberattackers are delivering malware by using links from whitelisted sites
Legitimate-looking links from OneDrive, Google Drive, iCloud, and Dropbox slip by standard security measures. Advertise on IT Security News. Read the complete article: Cyberattackers are delivering malware by using links from whitelisted sites
How world leaders use big data
It’s a fine line between countries sharing data in order to help with common interests and imposing on the privacy of those who provide it. The World Economic Forum’s director weighs in. Advertise on IT Security News. Read the…
American cases added to 3D map showing the spread of COVID-19
The outbreak is slowing down in China while the WHO warns the rest of the world to “pull out all the stops” to control the spread of the illness. Advertise on IT Security News. Read the complete article: American…
10 best practices for using Windows servers
Follow these tips to keep your Windows-based servers operating smoothly, securely, and efficiently. Advertise on IT Security News. Read the complete article: 10 best practices for using Windows servers
Mimecast tracks growing Malware-as-a-Service trend in analysis of 202 billion emails
Software security company identified 92 billion malicious mails in Q4 and a spike in Emotet and ransomware. Advertise on IT Security News. Read the complete article: Mimecast tracks growing Malware-as-a-Service trend in analysis of 202 billion emails
How to install and use the NordPass password manager on Linux
The makers of NordVPN have come out with a new version of their NordPass password manager. Find out how to install and use it. Advertise on IT Security News. Read the complete article: How to install and use the…
How to maintain safe cybersecurity practices while transitioning workers from the office to remote workstations
With the spread of coronavirus, businesses are increasingly asking staff to work from home. We asked experts how to keep cybersecurity policies in place. Advertise on IT Security News. Read the complete article: How to maintain safe cybersecurity practices…
Americans worry more about identity theft than being murdered
A study finds that ID fraud is a greater concern than murder for 47% of Americans. Advertise on IT Security News. Read the complete article: Americans worry more about identity theft than being murdered
Coronavirus adds uncertainty and cost to tech company supply chains
Just-in-time manufacturing and low inventory levels mean even a short disruption can cause business interruptions. Advertise on IT Security News. Read the complete article: Coronavirus adds uncertainty and cost to tech company supply chains
Mimecast tracks Malware-as-a-Service trend in analysis of 202 billion emails
Software security company identified 92 billion malicious mails in Q4 and a spike in Emotet and ransomware. Advertise on IT Security News. Read the complete article: Mimecast tracks Malware-as-a-Service trend in analysis of 202 billion emails
Businesses should be texting customers, but with cybersecurity in mind
Consumers now expect businesses to communicate via text, but there are ways to do it securely without using a smartphone. Advertise on IT Security News. Read the complete article: Businesses should be texting customers, but with cybersecurity in mind
Coronavirus: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips on remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news about COVID-19. Advertise on IT Security News. Read the complete article:…
How to scan your WordPress sites for vulnerabilities
How confident are you with the security of your WordPress deployments? If you’re not 100% confident, you need to make use of the wpscan tool. Advertise on IT Security News. Read the complete article: How to scan your WordPress…
COVID-19: What business pros need to know
The coronavirus is spurring questions and concerns in the tech industry. Get tips about remote work, interviewing and hiring, travel, and cybersecurity, as well as the latest news. Advertise on IT Security News. Read the complete article: COVID-19: What…
Number of spoof attempts on domains drops to “near zero” within months of DMARC enforcement
Despite an increase in usage, a Valimail report found that of the 933,000 organizational domains with DMARC, only 13% are at enforcement. Advertise on IT Security News. Read the complete article: Number of spoof attempts on domains drops to…
UK company uses cell phone chips to create super secure browsing
Garrison is using ARM processor chips to create a hardware defense against data breaches and malware. Advertise on IT Security News. Read the complete article: UK company uses cell phone chips to create super secure browsing
How to install and use the open source OTPClient 2FA tool on Linux
If your desktop of choice is Linux, you don’t have to be without a 2FA tool, thanks to OTPClient. Advertise on IT Security News. Read the complete article: How to install and use the open source OTPClient 2FA tool…
4 essential things security experts do to protect their own data
Learn from the experts what it takes to keep hackers away from your personal data. Advertise on IT Security News. Read the complete article: 4 essential things security experts do to protect their own data
Almost half of mobile malware are hidden apps
Cybercriminals are finding new ways to get malware on mobile devices, including abusing Android’s accessibility features, according to a McAfee report. Advertise on IT Security News. Read the complete article: Almost half of mobile malware are hidden apps
7 security tips for IoT systems
Security risks are important considerations with IoT initiatives. A Kaspersky report includes steps to take to prevent an IoT-targeted attack. Advertise on IT Security News. Read the complete article: 7 security tips for IoT systems
Data security: 5 problems and solutions
When it comes to securing data, most enterprises are negligent and unaware, according to a Lepide report. Advertise on IT Security News. Read the complete article: Data security: 5 problems and solutions
Cybercriminals and drug cartels are teaming up to spread malware and steal financial information across Latin America
Drug cartels are using cryptocurrency and partnering with hackers to scam banks in Latin American banks. Advertise on IT Security News. Read the complete article: Cybercriminals and drug cartels are teaming up to spread malware and steal financial information…
How to create a Linux user that cannot log in
For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how. Advertise on IT Security News. Read the complete article: How to create a Linux user that cannot…