World Password Day: Computer credentials are just as important as passwords—protect them, too

World Password Day: Computer credentials are just as important as passwords—protect them, too

Expert discusses the importance of keeping internal computer credentials as safe as your passwords. The need for security never goes away. TechRepublic’s Karen Roby spoke with Robert Haynes of Checkmarx, a software security solution, about World Password Day, May 6, 2021. The following is an edited transcript of their conversation. SEE: Security incident response policy (TechRepublic Premium) Karen Roby: So, passwords are still a thing. Many thought that by this day and age they would…

Read More

Cybersecurity: Don’t blame employees—make them feel like part of the solution

Cybersecurity: Don’t blame employees—make them feel like part of the solution

Scientists find that blaming employees is counterproductive and suggest creating a safe environment for people to admit their mistakes and learn from them. One company already puts that into practice. Image: SvetaZi/Shutterstock Human error is not going away anytime soon, so we need to get past the blame game and figure out how to stop cyber bad guys. Thankfully, several behavioral scientists are working hard to accomplish this, including Amy C. Edmondson, the Novartis Professor…

Read More

Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right | McAfee Blogs

Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right | McAfee Blogs

Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to commit hostile acts with impunity. The EU, in its overhaul of cybersecurity laws dubbed NIS2, is committed to ensuring that what’s illegal offline should also be illegal online. For that to happen, cybersecurity researchers need to have access to all the tools possible to detect, trace and prevent crime online, including access to the Internet’s…

Read More

Most of Exim email servers could be hacked by exploiting 21Nails flaws

Most of Exim email servers could be hacked by exploiting 21Nails flaws

The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim email server software have released security updates to address a collection of 21 vulnerabilities, dubbed 21Nails, that can be exploited by attackers to take over servers and access email traffic through them. Exim is a free mail transfer agent (MTA) used on Unix-like operating systems,…

Read More

“Unusually Unhinged” Cyber-stalker Jailed for 10 Years

“Unusually Unhinged” Cyber-stalker Jailed for 10 Years

The United States has imprisoned a man who continued to cyber-stalk his ex-wife and kids after they moved states and changed their names to evade him. The determined Oscar Adrian Marquez tracked his former wife, Jennifer Lorraine, and two daughters from New Mexico to Oregon, harassing them even after they purchased guns and took out a protection order against him. Following a three-day trial in November 2020, 47-year-old Marquez was convicted of stalking, cyberstalking, and three counts of…

Read More

CaptureRx Data Breach Impacts Healthcare Providers

CaptureRx Data Breach Impacts Healthcare Providers

At least three American healthcare providers have suffered a data breach after a cyber-attack on an administrative services company in Texas. CaptureRx, which is based in San Antonio, fell victim to a ransomware attack on February 6. On February 19, an investigation into the attack determined that certain files had been accessed without authorization. During the attack, cyber-criminals exfiltrated files containing the personal health information (PHI) of more than 24,000 individuals. CaptureRx serves the Mohawk Valley Health…

Read More

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention. Image: Getty Images/iStockphoto Say that you’ve deployed Linux as your data center servers because of the reliability and security the open source platform offers. Don’t be fooled into thinking using Linux will be the be-all, end-all of your security needs. It’s always important to remember that, so long as it’s…

Read More

Android phones may be vulnerable to security flaw in Qualcomm chip

Android phones may be vulnerable to security flaw in Qualcomm chip

Patched on Qualcomm’s end, the flaw could allow attackers to access your call history and text messages and eavesdrop on your phone conversations, says Check Point Research. Android phone users may be susceptible to a security vulnerability that could compromise their devices. In a research report published Thursday, cyber threat intelligence provider Check Point Research revealed certain details on a flaw it identified in 2020 in Qualcomm mobile station modem (MSM) chips, including ones used…

Read More

DOD Expands Hacker Program

DOD Expands Hacker Program

The United States Department of Defense (DOD) has expanded its ethical hacking program to include more targets. DoD officials announced yesterday that the Department’s Vulnerability Disclosure Program will be broadened to include all publicly accessible DOD information systems. Bug hunters were first invited to engage with the DOD in 2016 when the initiative ‘Hack the Pentagon’ was launched. Through this initiative, the Defense Digital Service set up a bug bounty program to reward ethical hackers for identifying flaws…

Read More
1 2,375 2,376 2,377 2,378 2,379 2,662