The private videos of some Google Photos users were accidentally shared with other people. Here’s how to secure online files to protect them from exposure. Advertise on IT Security News. Read the complete article: Tips on keeping a Google…
Tag: Security on TechRepublic
Report: Smart bulbs have a major security problem
Many Philips Hue smart light bulbs have a firmware flaw that leads hackers into an entire network, Check Point Research found. Advertise on IT Security News. Read the complete article: Report: Smart bulbs have a major security problem
How to defend your organization against the latest malware, botnets and security exploits
Though the fourth quarter of 2019 saw a decrease in malicious activity, threats such as the Emotet malware continued to thrive, says Nuspire. Advertise on IT Security News. Read the complete article: How to defend your organization against the…
How to protect your organization from infrastructure as code security risks
Infrastructure as code offers advantages in automating your data center management but also carries certain risks, says Unit 42, the global threat intelligence team at Palo Alto Networks. Advertise on IT Security News. Read the complete article: How to…
Why certain companies are more heavily targeted by DDoS attacks
Most of the targets in 2019 were in the gaming and gambling industries, says security company Imperva. Advertise on IT Security News. Read the complete article: Why certain companies are more heavily targeted by DDoS attacks
How to sign up for Firefox breach alerts
Mozilla offers users a service that will send alerts for account breaches associated with email addresses. Find out how to use Firefox Monitor. Advertise on IT Security News. Read the complete article: How to sign up for Firefox breach…
Why many security pros lack confidence in their implementation of Zero Trust
Almost half of security professionals don’t know where or how to use Zero Trust policies in a hybrid IT environment, says a survey commissioned by security provider Pulse Secure. Advertise on IT Security News. Read the complete article: Why…
4 key trends to hit the cybersecurity industry in 2020
Get ready for consolidation risk, microbreaches, and other cybersecurity hazards, warn experts from Mimecast, the Cyber Resilience Think Tank. Advertise on IT Security News. Read the complete article: 4 key trends to hit the cybersecurity industry in 2020
3D map shows how the coronavirus is spreading worldwide
A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers. Advertise on IT Security News. Read the complete article: 3D map shows how the coronavirus is spreading worldwide
3D map shows how the coronavirus spread worldwide
A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers. Advertise on IT Security News. Read the complete article: 3D map shows how the coronavirus spread worldwide
Phishing tournament finds employees falling prey to malicious emails
The Gone Phishing Tournament tested how susceptible people are to opening fraudulent emails and entering their login information. Advertise on IT Security News. Read the complete article: Phishing tournament finds employees falling prey to malicious emails
Hackers using coronavirus scare to spread Emotet malware in Japan
Cybercriminals are using global fears about the virus to spread the Emotet trojan. Advertise on IT Security News. Read the complete article: Hackers using coronavirus scare to spread Emotet malware in Japan
Super Bowl 2020: How 5G will help keep fans safe at the game
High-tech security features will help keep 49ers and Chiefs fans safe during Super Bowl weekend in Miami. Advertise on IT Security News. Read the complete article: Super Bowl 2020: How 5G will help keep fans safe at the game
Super Bowl 54: How 5G will help keep fans safe at the game
High-tech security features will help keep 49ers and Chiefs fans safe during Super Bowl weekend in Miami. Advertise on IT Security News. Read the complete article: Super Bowl 54: How 5G will help keep fans safe at the game
Ashley Madison breach victims have more to worry about
Five-year old data from the site’s breach is at the center of a new cryptocurrency ransom campaign, and it may be the beginning of a new trend. Advertise on IT Security News. Read the complete article: Ashley Madison breach…
How to change iOS 13 settings for better security
Learn how to secure your iOS 13 devices and protect your privacy by tweaking the default settings. Advertise on IT Security News. Read the complete article: How to change iOS 13 settings for better security
How to avoid the mistakes made in the UN data breach
Falling prey to a hacker because it neglected to properly patch its systems, the United Nations also failed to publicly disclose the hack. Here’s how your organization can avoid the same mistakes. Advertise on IT Security News. Read the…
How organizations should handle data breaches
How an organization handles a breach can be just as critical as protecting against one, according to Security.org. Advertise on IT Security News. Read the complete article: How organizations should handle data breaches
Top 10 tech policy trends to watch in 2020
Given the tech industry’s poor track record of protecting users data and controlling its environmental impact, regulators around the globe are stepping into the void. Advertise on IT Security News. Read the complete article: Top 10 tech policy trends…
97 of the world’s 100 largest airports have massive cybersecurity risks
An investigation of airport cybersecurity found glaring gaps in security for web and mobile applications, misconfigured public clouds, Dark Web exposure and code repositories leaks. Advertise on IT Security News. Read the complete article: 97 of the world’s 100…
How to enable facial recognition in the BitWarden mobile password manager
The latest version of the BitWarden Android client supports facial recognition. Find out how to enable it. Advertise on IT Security News. Read the complete article: How to enable facial recognition in the BitWarden mobile password manager
Snowflake is the Linux SSH GUI you didn’t know you needed
Is a Linux SSH GUI in your future? Jack Wallen believes once you try Snowflake, there’s no going back. Advertise on IT Security News. Read the complete article: Snowflake is the Linux SSH GUI you didn’t know you needed
Data Privacy: Top trends to watch in 2020
Data privacy is an increasing concern for companies and individuals. Learn more about what’s on the landscape for 2020. Advertise on IT Security News. Read the complete article: Data Privacy: Top trends to watch in 2020
Cyberattacks against endpoints rising, reaching $9 million per attack in 2019
Attacks against endpoints have become more costly, up more than $2 million since 2018. Advertise on IT Security News. Read the complete article: Cyberattacks against endpoints rising, reaching $9 million per attack in 2019
C-suite unprepared for NotPetya and other extinction-level cyberattacks
Many executives either don’t know what their company’s cyber defense is, lack budget, or spend too much time analyzing rather than taking action. Advertise on IT Security News. Read the complete article: C-suite unprepared for NotPetya and other extinction-level…
Security admins checklist: 10 tasks to perform every year
Here are 10 important tasks security administrators should perform to keep devices protected and secure. Advertise on IT Security News. Read the complete article: Security admins checklist: 10 tasks to perform every year
How to set up secure credential storage for Docker
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage. Advertise on IT Security News. Read the complete article: How to set up secure credential storage for Docker
Okta ranks the most popular and fastest-growing apps in the enterprise
Okta’s annual study shows companies investing in apps and tools focused on security, data, and app development; favorites include GitHub and Zoom. Advertise on IT Security News. Read the complete article: Okta ranks the most popular and fastest-growing apps…
Risk managers: Here are the must-have skills for 2020
The risk management field is growing more challenging as threats evolve. How will these changing threats affect your organization in 2020? Advertise on IT Security News. Read the complete article: Risk managers: Here are the must-have skills for 2020
What’s your organization’s cybersecurity strategy?
Take this quick, multiple choice survey and tell us about your company’s cybersecurity strategies for the upcoming year. Advertise on IT Security News. Read the complete article: What’s your organization’s cybersecurity strategy?
Hackers targeting Arabic-speaking countries with malicious Microsoft Office documents
Cybercriminals created a homemade RAT that uses multiple cloud services and targets countries like Saudi Arabia, Iraq, Egypt, Libya, Algeria, and Morocco. Advertise on IT Security News. Read the complete article: Hackers targeting Arabic-speaking countries with malicious Microsoft Office…
How to add a host to Observium
Now that you have the Observium network monitoring platform installed, it’s time to add a host. Advertise on IT Security News. Read the complete article: How to add a host to Observium
How to set up secure credential storage for Docker
Learn how to avoid saving your Docker login credentials in plain text by creating an encrypted credential storage. Advertise on IT Security News. Read the complete article: How to set up secure credential storage for Docker
5G promises faster speeds and greater security risks
TechRepublic’s Karen Roby talks with Radware exec Mike O’Malley about the growing security risks that accompany 5G for providers, smart cities, and the enterprise Advertise on IT Security News. Read the complete article: 5G promises faster speeds and greater…
How to protect previous Firefox tabs from being hijacked
Learn how to secure Firefox tabs from mischief with the Don’t Touch My Tabs add-on. Advertise on IT Security News. Read the complete article: How to protect previous Firefox tabs from being hijacked
Why many small and midsized businesses remain vulnerable to cyberattack
Budget limitations and a lack of knowledge or training are two major factors hurting many SMBs, according to a survey from Untangle. Advertise on IT Security News. Read the complete article: Why many small and midsized businesses remain vulnerable…
How to protect your organization against targeted phishing attacks
Companies should realize that any user could be a target and use threat data to build a security awareness training program, says Proofpoint. Advertise on IT Security News. Read the complete article: How to protect your organization against targeted…
3 biggest threats cybersecurity professionals are facing in 2020
Organizations are moving toward next-generation cybersecurity solutions this year, but security fragmentation is a looming threat. Advertise on IT Security News. Read the complete article: 3 biggest threats cybersecurity professionals are facing in 2020
How to disconnect devices and revoke app privileges from your Firefox cloud account
You’ll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them. Advertise on IT Security News. Read the complete article: How to disconnect devices and revoke app…
Analysts question whether FBI election cybersecurity changes are robust enough
New guidelines show how the agency will coordinate with state officials in the event of a cyberattack on election infrastructure. Advertise on IT Security News. Read the complete article: Analysts question whether FBI election cybersecurity changes are robust enough
Email malware targets U.S. senator and military
The cybercriminals behind the powerful banking malware have turned their attention to government targets like Sen. Cory Booker. Advertise on IT Security News. Read the complete article: Email malware targets U.S. senator and military
Bug bounties won’t make you rich (but you should participate anyway)
Commentary: There’s a lot of hype about bug bounties, but here’s some truth. Advertise on IT Security News. Read the complete article: Bug bounties won’t make you rich (but you should participate anyway)
Why corporate boards are unprepared to handle cybersecurity risks
A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance. Advertise on IT Security News. Read the complete article: Why corporate boards are unprepared to handle cybersecurity risks
iOS-based devices: Zero-touch management essentials
Managing multiple devices can be a full-time job. With a few tools in your arsenal, you can optimize mobile devices for zero-touch management. Advertise on IT Security News. Read the complete article: iOS-based devices: Zero-touch management essentials
Windows 7 remains an albatross at many large organizations
Among 60,000 large companies analyzed by security ratings company BitSight, almost 90% still have Windows 7 PCs in their environment. Advertise on IT Security News. Read the complete article: Windows 7 remains an albatross at many large organizations
If you don’t like your browser, why won’t you change to a different one?
Commentary: Users tend to stick with their preferred browser even when it works poorly for them. Advertise on IT Security News. Read the complete article: If you don’t like your browser, why won’t you change to a different one?
How to use a physical security key to sign into supported websites
A security key is a good option to use for two-factor authentication when logging into certain websites. Advertise on IT Security News. Read the complete article: How to use a physical security key to sign into supported websites
How to access your 2FA Docker Hub account from the command line
With 2FA enabled on your Docker Hub account, you’ll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work. Advertise on IT Security News. Read the complete…
This new startup aims to make developers love security
Commentary: As more workloads move to the cloud, developers need help with security. Find out how the startup Cyral is helping to improve data security in the cloud. Advertise on IT Security News. Read the complete article: This new…
Why baby boomers are looking to IoT and analytics to stay safe
IoT security is becoming a top-of-mind priority in the personal care industry. Essence group believes it has the solution and had it on display at CES 2020. Advertise on IT Security News. Read the complete article: Why baby boomers…
Why blockchain-based cybersecurity may be the answer for vulnerable IoT networks
CES 2020: A “hacked” robot was on display to demonstrate how SigmaDots serverless architecture is poised to fend off IoT security threats. Advertise on IT Security News. Read the complete article: Why blockchain-based cybersecurity may be the answer for…
New phishing attack hijacks email conversations: How companies can protect employees
By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks. Advertise on IT Security News. Read the complete article: New phishing attack hijacks email conversations:…
How to protect your organization and employees from conversation hijacking
By inserting themselves into business emails among employees, cybercriminals can trick victims into wiring money or sharing payment information, says security firm Barracuda Networks. Advertise on IT Security News. Read the complete article: How to protect your organization and…
CES 2020 roundup: All the business tech news you need to know
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR. Advertise on IT Security News. Read the complete article: CES 2020 roundup:…
These subject lines are the most clicked for phishing
The most successful email lures don’t promise riches, but issue imminent cybersecurity warnings or urgent office messages, a report reveals. Advertise on IT Security News. Read the complete article: These subject lines are the most clicked for phishing
How a researcher exploited the Windows 10 bug patched by Microsoft
The work by security researcher Saleem Rashid shows that the bug could be exploited in the real world to spoof security certificates on machines without Microsoft’s patch. Advertise on IT Security News. Read the complete article: How a researcher…
How to add a host to Observium
Now that you have the Observium network monitoring platform installed, it’s time to add a host. Advertise on IT Security News. Read the complete article: How to add a host to Observium
How to better protect your organization’s most valuable data
Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire. Advertise on IT Security News. Read the complete article: How to better protect your organization’s most valuable data
Why Google plans to cut off support for third-party cookies in Chrome
Google is aiming to phase out third-party cookies in Chrome in two years, but that will have to prove palatable to users, publishers, and advertisers. Advertise on IT Security News. Read the complete article: Why Google plans to cut…
How to disconnect devices and revoke app privileges from your Firefox cloud account
You’ll be surprised at how many devices, apps, and services are associated with your Firefox cloud account. Find out how to remove them. Advertise on IT Security News. Read the complete article: How to disconnect devices and revoke app…
Microsoft rolls out patch for serious Windows bug highlighted by NSA
Designed to exploit a vulnerability in Windows 10 and Windows Server 2016 and 2019, the bug could allow an attacker to remotely access and control an infected computer. Advertise on IT Security News. Read the complete article: Microsoft rolls…
Why corporate boards are unprepared to handle cybersecurity risks
A new report recommends that corporate boards answer four key questions on a regular basis to guide cybersecurity governance. Advertise on IT Security News. Read the complete article: Why corporate boards are unprepared to handle cybersecurity risks
CES 2020 roundup: All the business tech news you need to know
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR. Advertise on IT Security News. Read the complete article: CES 2020 roundup:…
How to protect your Windows 7 computers and data after Microsoft cuts off support
With no bug fixes or patches available for Windows 7 after Jan. 14, Veritas CIO John Abel offers tips to safeguard the PCs in your organization. Advertise on IT Security News. Read the complete article: How to protect your…
What to do if you’re still running Windows 7
Your best bet is to finish a migration to Windows 10 ASAP, but there are other options in the interim, says content delivery company Kollective. Advertise on IT Security News. Read the complete article: What to do if you’re…
December’s Most Wanted Malware: Greta Thunberg-themed spam used to spread Emotet
Check Point’s December 2019 Index finds Emotet as lead malware for the third month in a row, spreading email spam, some which alleged support of the teen activist. Advertise on IT Security News. Read the complete article: December’s Most…
CES 2020: Why HBO wants us to think twice about data privacy
A Westworld-themed experience gave attendees a creepy glimpse into tech consequences of the future. Advertise on IT Security News. Read the complete article: CES 2020: Why HBO wants us to think twice about data privacy
CES 2020 roundup: All the business tech news you need to know
CES was more exciting than ever this year. Key topics included 5G, AI, IoT, robotics, Wi-Fi 6, edge computing, automation, blockchain, quantum computing, privacy, AR, and VR. Advertise on IT Security News. Read the complete article: CES 2020 roundup:…
CES 2020: Why HBO wants us to think twice about data privacy in the future
A Westworld-themed experience gave CES attendees a creepy glimpse into tech consequences of the future. Advertise on IT Security News. Read the complete article: CES 2020: Why HBO wants us to think twice about data privacy in the future
Why big data may help you sleep better at night
At CES 2020, Sleep Number debuted its latest smart beds, which feature climate-controlled technology that gathers data while you snooze. Advertise on IT Security News. Read the complete article: Why big data may help you sleep better at night
CES 2020: Biggest tech trends spotted for business pros
From analytics and AI to 5G and Wi-Fi 6, here’s all the enterprise tech that took center stage at CES 2020. Advertise on IT Security News. Read the complete article: CES 2020: Biggest tech trends spotted for business pros
How AI, ML, and automation can improve cybersecurity protection
Read insights from industry experts on how artificial intelligence and machine learning will help prevent cybersecurity breaches. Advertise on IT Security News. Read the complete article: How AI, ML, and automation can improve cybersecurity protection
TP-Link routers get a little safer with AI-powered security features
The new features come from a partnership with security firm Avira, but they won’t be free: They’re part of a new package called HomeCare Pro. Advertise on IT Security News. Read the complete article: TP-Link routers get a little…
PATSCAN platform detects hidden weapons, chemicals, and bombs
At CES 2020, Patriot One Technologies explained its PATSCAN platform, which can detect hidden weapons and more without the perpetrator even knowing they’ve been scanned. Advertise on IT Security News. Read the complete article: PATSCAN platform detects hidden weapons,…
How cybercriminals are using Microsoft Sway to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted, says security firm Avanan. Advertise on IT Security News. Read the complete article: How cybercriminals are using Microsoft Sway to launch…
Patscan platform detects hidden weapons, chemicals and bombs
At CES 2020, Patriot One Technologies explained its Patscan platform, which can detect hidden weapons and more without the perpetrator even knowing they’ve been scanned. Advertise on IT Security News. Read the complete article: Patscan platform detects hidden weapons,…
How to access your 2FA Docker Hub account from the command line
With 2FA enabled on your Docker Hub account, you’ll find you cannot access it with your user password from within the CLI. Jack Wallen shows you how to make this work. Advertise on IT Security News. Read the complete…
Developers weigh in on why Rust is so hot
Commentary: Rust keeps getting hotter. Here are a few of the top reasons. Advertise on IT Security News. Read the complete article: Developers weigh in on why Rust is so hot
CES 2020: How McAfee’s Just in Time debugger stops cybercriminals
How the Advanced Threat Research Team can stop hackers from stealing personal data from a wearable device. Advertise on IT Security News. Read the complete article: CES 2020: How McAfee’s Just in Time debugger stops cybercriminals
Apple exec explains privacy protections, while Facebook leader looks for loopholes
At CES 2020, Facebook privacy officer says new California law doesn’t apply because the company doesn’t sell data, only ads. Advertise on IT Security News. Read the complete article: Apple exec explains privacy protections, while Facebook leader looks for…
How to set up facial recognition to sign into Windows 10
You can sign into Windows 10 via your face, as long as your computer has a supported camera. Advertise on IT Security News. Read the complete article: How to set up facial recognition to sign into Windows 10
Comcast announces new Wi-Fi 6-certified gateway, security features for internet customers at CES 2020
Comcast is making its internet service faster and more secure with new hardware and free security features that alerts customers to threats. Advertise on IT Security News. Read the complete article: Comcast announces new Wi-Fi 6-certified gateway, security features…
5 predictions for protecting data in the payments and security ecosystem
As demand for personalization and seamless consumer experiences grow, security must keep up, said VISA’s chief risk officer. Advertise on IT Security News. Read the complete article: 5 predictions for protecting data in the payments and security ecosystem
Alert overload is burning out security analysts
Survey suggests overall volume and high rate of false problems are changing priority lists in security operations centers. Advertise on IT Security News. Read the complete article: Alert overload is burning out security analysts
How to install and use git-secret
Learn how to gain more security in your git repository with the help of the git-secret tool. Advertise on IT Security News. Read the complete article: How to install and use git-secret
3 security tips to protect yourself from skimming attacks
E-commerce sites are trying to keep up with sophisticated skimming schemes, but chances are your credit card information will still be compromised. A security expert offers advice. Advertise on IT Security News. Read the complete article: 3 security tips…