Tag: Security on TechRepublic

How to use FreeRADIUS for SSH authentication

Read the original article: How to use FreeRADIUS for SSH authentication Jack Wallen shows you how to install and configure FreeRADIUS as a centralized SSH authentication tool.   Become a supporter of IT Security News and help us remove the…

Nation-state cyber attacks could lead to cyber conflict

Read the original article: Nation-state cyber attacks could lead to cyber conflict New HP-sponsored report finds significant increase in nation-states targeting enterprises to steal high-value IP.   Become a supporter of IT Security News and help us remove the ads.…

How to better combat malware delivered through email

Read the original article: How to better combat malware delivered through email A majority of security pros said they’re most concerned about malicious payloads sent to employees via file attachments, according to a survey from GreatHorn.   Become a supporter…

Mobile devices proved vulnerable during pandemic lockdowns

Read the original article: Mobile devices proved vulnerable during pandemic lockdowns According to Verizon, nearly half of businesses sacrificed mobile device security best practices to “get the job done.”   Become a supporter of IT Security News and help us…

Perimeter 81 launches new Firewall-as-a-Service offering

Read the original article: Perimeter 81 launches new Firewall-as-a-Service offering The network defense provider joins a growing list of companies offering cloud-based firewalls.   Become a supporter of IT Security News and help us remove the ads. Read the original…

Vulnerabilities are high in new applications, expert says

Read the original article: Vulnerabilities are high in new applications, expert says Most vulnerabilities are never patched, leaving users susceptible to cyberattacks.   Become a supporter of IT Security News and help us remove the ads. Read the original article:…

Linux 101: The different types of sudo and su

Read the original article: Linux 101: The different types of sudo and su Knowing which sudo or su command to run is important. Jack Wallen demystifies these two Linux admin tools.   Become a supporter of IT Security News and…

How financial cybercrime targets shifted in 2020

Read the original article: How financial cybercrime targets shifted in 2020 COVID lockdowns may be behind a major change toward targeting e-commerce and using new forms of attacks, Kaspersky finds.   Become a supporter of IT Security News and help…

How to use the new HTTPS-Only mode in Firefox

Read the original article: How to use the new HTTPS-Only mode in Firefox Firefox’s new feature automatically redirects from HTTP to HTTPS and should be considered a must-use for the security-minded. Jack Wallen explains, and shows you how to enable…

How to use Google’s Password Checkup tool

Read the original article: How to use Google’s Password Checkup tool Google offers a password checking service that will check all of your Chrome-saved passwords for weaknesses and against known breaches. Jack Wallen shows you how to use this tool.…

Malicious attack now targeting video gamers and modders

Read the original article: Malicious attack now targeting video gamers and modders Malware is being hidden in seemingly legitimate files that gamers download to install cheat codes or modifications, says Cisco Talos.   Become a supporter of IT Security News…

SolarWinds attack makes us distrust the software we buy

Read the original article: SolarWinds attack makes us distrust the software we buy Security expert says because we can’t inspect the inner workings of the software we buy, we’re at the mercy of software companies’ security practices.   Become a…

Tips for robotic developers

Read the original article: Tips for robotic developers KODA advising CTO John Suit discusses the skills and languages that are important for developers who want to build software and systems for modern robots.   Become a supporter of IT Security…

Coding for robots: Need-to-know languages and skills

Read the original article: Coding for robots: Need-to-know languages and skills KODA advising CTO John Suit discusses the skills and languages that are important for developers who want to build software and systems for modern robots.   Become a supporter…

How phishing attacks evade traditional security defenses

Read the original article: How phishing attacks evade traditional security defenses Two of three phishing pages analyzed by Armorblox were hosted on legitimate services to try to sneak past the usual security protection.   Become a supporter of IT Security…

Multi-factor authentication: Top 5 things to know

Read the original article: Multi-factor authentication: Top 5 things to know MFA can help make your organization more secure. Tom Merritt lists five things you need to know about multi-factor authentication.   Become a supporter of IT Security News and…

Top 5 things to know about multi-factor authentication

Read the original article: Top 5 things to know about multi-factor authentication MFA can help make your organization more secure. Tom Merritt lists five things you need to know about multi-factor authentication.   Become a supporter of IT Security News…

Beware of scams this tax season

Read the original article: Beware of scams this tax season Cybercriminals are using phishing emails on tax filers to scam them out of money. Be careful which emails you click on.   Become a supporter of IT Security News and…

Weak passwords are dangerous to your organization

Read the original article: Weak passwords are dangerous to your organization People are still using “Password” and “123456” to secure their accounts, NordPass says. Ensure strong security for your business.   Become a supporter of IT Security News and help…

Report: 40% of SaaS application users have lost data

Read the original article: Report: 40% of SaaS application users have lost data Ahead of World Backup Day, it’s a good reminder for companies of all sizes to ensure they have complete, usable backups for key business apps, says Rewind.…

IBM launches new services to simplify hybrid cloud security

Read the original article: IBM launches new services to simplify hybrid cloud security The security services are designed to help protect data, user identities, workloads and applications across dispersed cloud and on-premises systems.   Become a supporter of IT Security…

5 tips for implementing a zero trust model

Read the original article: 5 tips for implementing a zero trust model As attackers increasingly target less traditional users, accounts and assets, organizations should consider such a process to tighten security, says CyberArk.   Become a supporter of IT Security…

Gartner: Top security and risk management trends for 2021

Read the original article: Gartner: Top security and risk management trends for 2021 The 8 top trends cited will enable rapid reinvention, including the skills gap, cybersecurity mesh and identity-first security.   Become a supporter of IT Security News and…

7 expert tips on recruiting cybersecurity pros

Read the original article: 7 expert tips on recruiting cybersecurity pros HR and recruiting experts offer unique ways to find and hire cybersecurity talent.   Become a supporter of IT Security News and help us remove the ads. Read the…

Cloudflare introduces SD-WAN- and firewall-as-a-service offerings

Read the original article: Cloudflare introduces SD-WAN- and firewall-as-a-service offerings In a bid to replace MPLS circuits and SD-WAN appliances, Cloudflare has introduced Magic WAN and Magic Firewall and partnerships with VMware, Aruba, Digital Realty, CoreSite and EdgeConneX.   Become…

How to use semanage and avoid disabling SELinux

Read the original article: How to use semanage and avoid disabling SELinux Jack Wallen introduces you to three semanage commands that will help make dealing with SELinux considerably easier.   Become a supporter of IT Security News and help us…

Crimeware-as-a-service is the latest ransomware threat

Read the original article: Crimeware-as-a-service is the latest ransomware threat BlackBerry researchers see more double-extortion ransomware attacks, attackers demanding ransom from healthcare patients, and rising bitcoin prices driving the growth of ransomware.   Become a supporter of IT Security News…

Bitwarden: How to enable biometric login

Read the original article: Bitwarden: How to enable biometric login If you’d rather not have to enter your password every time you open the Bitwarden password manager on your mobile device, Jack Wallen shows you how to enable biometric login.…

Remote hiring: Cybersecurity best practices

Read the original article: Remote hiring: Cybersecurity best practices Subtle cybersecurity concerns are in play when vetting candidates remotely for a position that entails working remotely. Learn what they are and what to do about them.   Become a supporter…

Forrester: These 5 threats could hobble pandemic recovery

Read the original article: Forrester: These 5 threats could hobble pandemic recovery If businesses are going to successfully navigate the road ahead they’ll need to focus on these security problems and attack vectors.   Become a supporter of IT Security…

How malware is targeting the new Apple Macs

Read the original article: How malware is targeting the new Apple Macs As the new kid on the block, the M1 chip-based Mac is already on the radar of malware writers, says Kaspersky.   Become a supporter of IT Security…

How to use Bitwarden’s new Send feature

Read the original article: How to use Bitwarden’s new Send feature What is probably the best open source password manager on the market has added a new feature that will make using the tool even better.   Become a supporter…

How to remove legacy communication services on Linux

Read the original article: How to remove legacy communication services on Linux To keep your Linux servers and desktops as secure as possible, you should check for (and remove) legacy communication services. Jack Wallen shows you how.   Become a…

CEOs express strong optimism for global growth this year

Read the original article: CEOs express strong optimism for global growth this year While they remain anxious about external threats like health crises and cyber threats, concerns about climate change are low, PwC survey finds.   Become a supporter of…

Android: How to quickly block spam SMS

Read the original article: Android: How to quickly block spam SMS Jack Wallen shows you how easy it is to block and report spam SMS messages on the Android platform.   Become a supporter of IT Security News and help…

How to install and configure 2FA on AlmaLinux

Read the original article: How to install and configure 2FA on AlmaLinux Jack Wallen walks you through the process of enabling two-factor authentication on the new fork of CentOS, AlmaLinux.   Become a supporter of IT Security News and help…