Saturday, November 17, 2018
TechRepublic

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.
TechRepublic

How to auto mount FAT32-formatted drives in Samba

You might have a FAT32-formatted drive that needs to be shared out to users. To do that with write permissions, you must make use of fstab. Jack Wallen shows you how.
TechRepublic

The majority of business pros aren’t able to prevent cyberattacks

Only 25% of organizations feel confident in their abilities to respond effectively to cyberattacks, according to recent Ponemon Institute study.
TechRepublic

AI, supply chain, and IoT risks will dominate the 2019 cyberthreat landscape

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.
TechRepublic

Workers unaware of travel-related cybersecurity threats, survey finds

This holiday season, over half of adults plan to travel with work devices. Most don't appreciate the risks.
TechRepublic

The top 5 myths about cloud-based security

Enterprises are turning to security in the cloud for greater flexibility and reduced complexity, but several misconceptions exist. Here's the truth, according to a Forcepoint report.
TechRepublic

Cyber Monday shoppers will overlook past cybersecurity breaches for a good deal

Some 62% of online shoppers are willing to shop sites vulnerable to breaches for a discount on Cyber Monday, a DomainTools report says.
TechRepublic

Researchers discover seven new Meltdown and Spectre attacks

Experiments showed that processors from AMD, ARM, and Intel are affected.
TechRepublic

Micro data centers are changing IT’s role in the retail industry in unexpected ways

As brick-and-mortar retailers use micro data centers to power unique customer experiences and compete with online giants like Amazon, they're ramping up IT to manage these mission-critical systems.
TechRepublic

AI, IoT, and edge computing drive cybersecurity concerns for 2019

As companies adopt emerging technologies, the cyber risk landscape is set to grow larger in the new year, according to a Forcepoint report.
TechRepublic

69% of ATMs can be hacked to spit cash in minutes

ATM vulnerabilities highlight the importance of securing machines against network attacks, according to a Positive Technologies report.
TechRepublic

How to improve enterprise IoT security: 5 tips

Some 15% of companies struggling with IoT security lost at least $34 million in the last couple years. Here are five ways to stay better protected.
TechRepublic

4 communication fundamentals that should be in every disaster recovery plan

See where the communication breakdowns are likely to occur--and revise the disaster recovery plan accordingly.
TechRepublic

How to download your data stored by Apple

Downloading a copy of your data that Apple stores in iCloud and other services is easier than ever. Learn how to get your copy and what to do with it. Learn more about this massive privacy change.
TechRepublic

Android Security Bulletin November 2018: What you need to know

Another month where Android finds itself with a mixture of Critical and High vulnerabilities. Jack Wallen offers highlights.
SC Magazine

Instagram flaw exposes user passwords

A security flaw in Instagram’s recently released “Download Your Data” tool could have exposed some user passwords, the company reportedly told users. The tool, revealed by Instagram right before the GDPR regulation went into effect, is designed to let users...

Julian Assange Charges, Japan’s Top Cybersecurity Official, and More Security News This Week

Safer browsing, more bitcoin scams, and the rest of the week's top security news.
The Register

SMS 2FA database leak drama, MageCart mishaps, Black Friday badware, and more

Plus, why is Kaspersky Lab getting into chess? Roundup  What a week it has been: we had the creation of a new government agency, a meltdown flashback, and of course, Patch Tuesday.…
TechRepublic

Is retaining a cybersecurity attorney a good idea for your business?

Cybersecurity is so complicated that businesses, large and small, are retaining legal counsel specializing in security. Learn two more steps businesses should take before a cyberattack hits.

Machine Learning Can Create Fake ‘Master Key’ Fingerprints

Researchers have refined a technique to create so-called DeepMasterPrints, fake fingerprints designed to get past security.