Read the original article: How to use Docker Bench for Security to audit your container deployments Docker Bench for Security is a simple way of checking for common best practices around your Docker deployments in production. Jack Wallen shows you…
Tag: Security on TechRepublic
How to use FreeRADIUS for SSH authentication
Read the original article: How to use FreeRADIUS for SSH authentication Jack Wallen shows you how to install and configure FreeRADIUS as a centralized SSH authentication tool. Become a supporter of IT Security News and help us remove the…
How password anxiety is impacting individuals and organizations
Read the original article: How password anxiety is impacting individuals and organizations A majority of people said they’d avoid using certain websites or accounts where they’ve forgotten their password, says LastPass. Become a supporter of IT Security News and…
Nation-state cyber attacks could lead to cyber conflict
Read the original article: Nation-state cyber attacks could lead to cyber conflict New HP-sponsored report finds significant increase in nation-states targeting enterprises to steal high-value IP. Become a supporter of IT Security News and help us remove the ads.…
2021 Brings new security challenges and regulations for European CISOs
Read the original article: 2021 Brings new security challenges and regulations for European CISOs European CISOs are shifting how they spend on security in response to the COVID-19 pandemic and are having to adopt to a raft of new proposed…
How to better combat malware delivered through email
Read the original article: How to better combat malware delivered through email A majority of security pros said they’re most concerned about malicious payloads sent to employees via file attachments, according to a survey from GreatHorn. Become a supporter…
Mobile devices proved vulnerable during pandemic lockdowns
Read the original article: Mobile devices proved vulnerable during pandemic lockdowns According to Verizon, nearly half of businesses sacrificed mobile device security best practices to “get the job done.” Become a supporter of IT Security News and help us…
Data scraped from 500 million LinkedIn users found for sale online
Read the original article: Data scraped from 500 million LinkedIn users found for sale online IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks…
How poor password habits put your organization at risk
Read the original article: How poor password habits put your organization at risk More than half of the cyberattacks reported to Keeper Security involved stolen credentials. Become a supporter of IT Security News and help us remove the ads.…
Perimeter 81 launches new Firewall-as-a-Service offering
Read the original article: Perimeter 81 launches new Firewall-as-a-Service offering The network defense provider joins a growing list of companies offering cloud-based firewalls. Become a supporter of IT Security News and help us remove the ads. Read the original…
SAP and Onapsis detail findings of potential exploits on unprotected SAP apps
Read the original article: SAP and Onapsis detail findings of potential exploits on unprotected SAP apps The advanced cyber threat intelligence is aimed at customers who need to protect mission-critical applications, the companies said. Become a supporter of IT…
How the quick shift to the cloud has led to more security risks
Read the original article: How the quick shift to the cloud has led to more security risks Automating cloud security is a process still in its infancy for many organizations, says Unit 42. Become a supporter of IT Security…
Most applications today are deployed with vulnerabilities, and many are never patched
Read the original article: Most applications today are deployed with vulnerabilities, and many are never patched AppSec expert says cybersecurity should be a part of the development process from the beginning. Become a supporter of IT Security News and…
Vulnerabilities are high in new applications, expert says
Read the original article: Vulnerabilities are high in new applications, expert says Most vulnerabilities are never patched, leaving users susceptible to cyberattacks. Become a supporter of IT Security News and help us remove the ads. Read the original article:…
How marketing principles can be used to enhance cybersecurity training
Read the original article: How marketing principles can be used to enhance cybersecurity training Marketing psychology has influenced each of us; experts suggest it could help reduce the angst of cybersecurity training. Become a supporter of IT Security News…
Linux 101: The different types of sudo and su
Read the original article: Linux 101: The different types of sudo and su Knowing which sudo or su command to run is important. Jack Wallen demystifies these two Linux admin tools. Become a supporter of IT Security News and…
FirstNet public safety cellular network adds 5G and data encryption
Read the original article: FirstNet public safety cellular network adds 5G and data encryption AT&T’s public safety network picks up new features, including full tower-to-core encryption and a custom 5G setup. Become a supporter of IT Security News and…
Cisco Live 2021: New Webex features, as-a-service offerings, improved security and no passwords
Read the original article: Cisco Live 2021: New Webex features, as-a-service offerings, improved security and no passwords The company made a slew of announcements at its annual conference this week that will roll out throughout the year. Become a…
How financial cybercrime targets shifted in 2020
Read the original article: How financial cybercrime targets shifted in 2020 COVID lockdowns may be behind a major change toward targeting e-commerce and using new forms of attacks, Kaspersky finds. Become a supporter of IT Security News and help…
How to use the new HTTPS-Only mode in Firefox
Read the original article: How to use the new HTTPS-Only mode in Firefox Firefox’s new feature automatically redirects from HTTP to HTTPS and should be considered a must-use for the security-minded. Jack Wallen explains, and shows you how to enable…
Money laundering is a real issue in tech: Here’s what is being done to stop it
Read the original article: Money laundering is a real issue in tech: Here’s what is being done to stop it Technology shows us once that tech build for good people can be harnessed by bad actors. Experts talk about how…
How to use Google’s Password Checkup tool
Read the original article: How to use Google’s Password Checkup tool Google offers a password checking service that will check all of your Chrome-saved passwords for weaknesses and against known breaches. Jack Wallen shows you how to use this tool.…
Malicious attack now targeting video gamers and modders
Read the original article: Malicious attack now targeting video gamers and modders Malware is being hidden in seemingly legitimate files that gamers download to install cheat codes or modifications, says Cisco Talos. Become a supporter of IT Security News…
Microsoft Office 365 still the top target among phishing attacks
Read the original article: Microsoft Office 365 still the top target among phishing attacks Most of the recent credential phishing attacks seen by Menlo Security served phony Outlook and Office 365 login pages. Become a supporter of IT Security…
Shadow IT is your organization’s next remote working nightmare
Read the original article: Shadow IT is your organization’s next remote working nightmare Employees are increasingly using their own devices and accounts to work from home – largely because it’s easier to do so. Yet this rise in ‘shadow IT’…
Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges
Read the original article: Over 80% of IT leaders will adopt or expand cloud-based IAM and face challenges Adopting a hybrid approach can help organizations run, unify and secure all digital identities in an IT architecture, new research finds. …
Tax refund phishing scam targets university students and staffers
Read the original article: Tax refund phishing scam targets university students and staffers The IRS is warning of a phishing scam that promises refund information but looks to capture Social Security numbers and other sensitive data. Become a supporter…
Don’t give hackers a home run by using these baseball team names in your passwords
Read the original article: Don’t give hackers a home run by using these baseball team names in your passwords Cincinnati Reds fans: It’s especially time for you to rethink your team as a common part of your credentials. Become…
Trust in software security has eroded since the SolarWinds attack
Read the original article: Trust in software security has eroded since the SolarWinds attack We’re only as secure as the software we use, cybersecurity expert says. Become a supporter of IT Security News and help us remove the ads.…
SolarWinds attack makes us distrust the software we buy
Read the original article: SolarWinds attack makes us distrust the software we buy Security expert says because we can’t inspect the inner workings of the software we buy, we’re at the mercy of software companies’ security practices. Become a…
Tips for robotic developers
Read the original article: Tips for robotic developers KODA advising CTO John Suit discusses the skills and languages that are important for developers who want to build software and systems for modern robots. Become a supporter of IT Security…
Coding for robots: Need-to-know languages and skills
Read the original article: Coding for robots: Need-to-know languages and skills KODA advising CTO John Suit discusses the skills and languages that are important for developers who want to build software and systems for modern robots. Become a supporter…
What is cyber risk quantification, and why is it important?
Read the original article: What is cyber risk quantification, and why is it important? One way to get C-level managers and cybersecurity department heads on the same page is to employ cyber risk quantification, as it speaks to costs versus…
How phishing attacks evade traditional security defenses
Read the original article: How phishing attacks evade traditional security defenses Two of three phishing pages analyzed by Armorblox were hosted on legitimate services to try to sneak past the usual security protection. Become a supporter of IT Security…
10 tips to protect your organization and remote endpoints against cyberthreats
Read the original article: 10 tips to protect your organization and remote endpoints against cyberthreats While you need endpoint protection to secure your remote workers, you must still guard all your network services at the office and in the cloud,…
Multi-factor authentication: Top 5 things to know
Read the original article: Multi-factor authentication: Top 5 things to know MFA can help make your organization more secure. Tom Merritt lists five things you need to know about multi-factor authentication. Become a supporter of IT Security News and…
Top 5 things to know about multi-factor authentication
Read the original article: Top 5 things to know about multi-factor authentication MFA can help make your organization more secure. Tom Merritt lists five things you need to know about multi-factor authentication. Become a supporter of IT Security News…
PHP programming language source code targeted in backdoor attack
Read the original article: PHP programming language source code targeted in backdoor attack Malicious commits were made to the php-src repo on Sunday that could have enabled hackers to perform remote code execution on websites running the hijacked code. …
9 tips to protect your organization against ransomware
Read the original article: 9 tips to protect your organization against ransomware Over the past six months, the number of organizations hurt by ransomware shot up by more than 50%, says Check Point Research. Become a supporter of IT…
Report finds requiring customers to use passwords is bad for business
Read the original article: Report finds requiring customers to use passwords is bad for business To no one’s great surprise, as a means of authentication, passwords still suck. E-commerce customers will jump ship if there’s too much hassle. Become…
Beware of scams this tax season
Read the original article: Beware of scams this tax season Cybercriminals are using phishing emails on tax filers to scam them out of money. Be careful which emails you click on. Become a supporter of IT Security News and…
Remote work and increased cybersecurity threats presented both challenges and opportunities for MSPs
Read the original article: Remote work and increased cybersecurity threats presented both challenges and opportunities for MSPs Sixty-five percent of MSPs increased their revenue from delivering cybersecurity services even during the recession brought on by the pandemic, according to Kaseya.…
Weak passwords are dangerous to your organization
Read the original article: Weak passwords are dangerous to your organization People are still using “Password” and “123456” to secure their accounts, NordPass says. Ensure strong security for your business. Become a supporter of IT Security News and help…
Corporate doxing is on the rise: Here’s how hackers are doing it and how to stop them
Read the original article: Corporate doxing is on the rise: Here’s how hackers are doing it and how to stop them Doxing an individual can be a time-consuming and ultimately fruitless process, but the potential payout for doxing corporate employees…
Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions
Read the original article: Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on…
How to install the Pritunl VPN server on Ubuntu Server 20.04
Read the original article: How to install the Pritunl VPN server on Ubuntu Server 20.04 Looking for an easy-to-deploy VPN server for your data center? Jack Wallen walks you through the steps for installing the open source Pritunl solution. …
SolarWinds CEO gives chief security officer authority and air cover to make software security a priority
Read the original article: SolarWinds CEO gives chief security officer authority and air cover to make software security a priority New leader is also making changes to the software development process to make it harder for attackers to find vulnerabilities.…
Report: 40% of SaaS application users have lost data
Read the original article: Report: 40% of SaaS application users have lost data Ahead of World Backup Day, it’s a good reminder for companies of all sizes to ensure they have complete, usable backups for key business apps, says Rewind.…
Dodge is using two-factor authentication to secure its most powerful muscle cars
Read the original article: Dodge is using two-factor authentication to secure its most powerful muscle cars You’ll need more than just a key to drive this Hemi. Become a supporter of IT Security News and help us remove the…
IBM launches new services to simplify hybrid cloud security
Read the original article: IBM launches new services to simplify hybrid cloud security The security services are designed to help protect data, user identities, workloads and applications across dispersed cloud and on-premises systems. Become a supporter of IT Security…
How to protect your organization and yourself from cryptocurrency scams
Read the original article: How to protect your organization and yourself from cryptocurrency scams Crypto scams are on the rise due to the growing popularity of cryptocurrencies and the number of people in need of financial assistance during COVID-19, says…
5 tips for implementing a zero trust model
Read the original article: 5 tips for implementing a zero trust model As attackers increasingly target less traditional users, accounts and assets, organizations should consider such a process to tighten security, says CyberArk. Become a supporter of IT Security…
How to combat the security challenges of a remote workforce
Read the original article: How to combat the security challenges of a remote workforce A year into the pandemic, 79% of security leaders expressed fears over the risks of staff working from home, says Cybersecurity Insiders. Become a supporter…
REvil continues ransomware attack streak with takeover of laptop maker Acer
Read the original article: REvil continues ransomware attack streak with takeover of laptop maker Acer REvil previously infected the networks of Honda, the makers of Jack Daniels and a high-profile law firm representing Donald Trump. Become a supporter of…
Gartner: Top security and risk management trends for 2021
Read the original article: Gartner: Top security and risk management trends for 2021 The 8 top trends cited will enable rapid reinvention, including the skills gap, cybersecurity mesh and identity-first security. Become a supporter of IT Security News and…
Why it’s time the Android developers rethink WebView
Read the original article: Why it’s time the Android developers rethink WebView Jack Wallen offers up his take on the recent issue surrounding Android’s WebView. Become a supporter of IT Security News and help us remove the ads. Read…
How remote working still poses security risks for organizations
Read the original article: How remote working still poses security risks for organizations A year after the transition to remote working, many organizations continue to grapple with security issues and weaknesses, says PC Matic. Become a supporter of IT…
Phony COVID-19 vaccine certificates are now selling on the Dark Web
Read the original article: Phony COVID-19 vaccine certificates are now selling on the Dark Web With most of the world still not vaccinated against COVID-19, criminals are hawking fake vaccine documents, says Check Point Research. Become a supporter of…
7 expert tips on recruiting cybersecurity pros
Read the original article: 7 expert tips on recruiting cybersecurity pros HR and recruiting experts offer unique ways to find and hire cybersecurity talent. Become a supporter of IT Security News and help us remove the ads. Read the…
Cloudflare introduces SD-WAN- and firewall-as-a-service offerings
Read the original article: Cloudflare introduces SD-WAN- and firewall-as-a-service offerings In a bid to replace MPLS circuits and SD-WAN appliances, Cloudflare has introduced Magic WAN and Magic Firewall and partnerships with VMware, Aruba, Digital Realty, CoreSite and EdgeConneX. Become…
SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity
Read the original article: SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity The security key is built on open source hardware and firmware, making it a universal factor authentication device instead of a two-factor…
PS5 phishing scam baits gamers with promise of free console
Read the original article: PS5 phishing scam baits gamers with promise of free console Scammers are taking advantage of a shortage of Sony PlayStation 5 consoles to try to hoodwink people eager to snag one, says Kaspersky. Become a…
How to use semanage and avoid disabling SELinux
Read the original article: How to use semanage and avoid disabling SELinux Jack Wallen introduces you to three semanage commands that will help make dealing with SELinux considerably easier. Become a supporter of IT Security News and help us…
Business email compromise scams proved costly to victims in 2020
Read the original article: Business email compromise scams proved costly to victims in 2020 The FBI received more than 19,000 complaints of business email compromises last year, costing victims around $1.8 billion. Become a supporter of IT Security News…
Want to be an ethical hacker? Take these cybersecurity courses
Read the original article: Want to be an ethical hacker? Take these cybersecurity courses In these 18 online training courses on ethical hacking, cybersecurity pros will teach you about creating projects with Python, bug bounty hunting, Kali Linux hacker tools…
How cybercriminals are targeting US taxpayers as tax season approaches
Read the original article: How cybercriminals are targeting US taxpayers as tax season approaches The latest scams use phishing emails to deliver remote access trojans to control a victim’s computer and steal sensitive data, says Cybereason. Become a supporter…
Free hack_it event aims to help cybersecurity pros hone their skills
Read the original article: Free hack_it event aims to help cybersecurity pros hone their skills Attendees will explore the mind of a hacker, role play and share real-world experiences at the free two-day event hosted by Huntress. Become a…
Eternal Terminal: How to install for persistent SSH connections
Read the original article: Eternal Terminal: How to install for persistent SSH connections If you have trouble with SSH connections breaking, Jack Wallen shows you how you can enjoy a bit more persistence with the help of Eternal Terminal. …
More than 16 million COVID-themed cyberattacks launched in 2020
Read the original article: More than 16 million COVID-themed cyberattacks launched in 2020 A Trend Micro report found that its system dealt with 16.4 million threats that used COVID-19 as a hook. Become a supporter of IT Security News…
What consumers really think of the upcoming IDFA opt-in, protecting privacy and smartphone data
Read the original article: What consumers really think of the upcoming IDFA opt-in, protecting privacy and smartphone data App developers need to implement workarounds and create an understanding of the benefits of shared data, according to a new survey from…
Beware of stalkerware: Stalkers use it to track your every move
Read the original article: Beware of stalkerware: Stalkers use it to track your every move Kaspersky warns that with a stalkerware app, another person can spy on your activities and view your personal information. Become a supporter of IT…
Crimeware-as-a-service is the latest ransomware threat
Read the original article: Crimeware-as-a-service is the latest ransomware threat BlackBerry researchers see more double-extortion ransomware attacks, attackers demanding ransom from healthcare patients, and rising bitcoin prices driving the growth of ransomware. Become a supporter of IT Security News…
How to protect your Microsoft Office 365 environment from cyber threats
Read the original article: How to protect your Microsoft Office 365 environment from cyber threats A quick shift toward Microsoft Office 365 and Azure AD in the cloud has expanded the attack surface for many organizations, says Vectra AI. …
How a reliance on the cloud still poses security risks
Read the original article: How a reliance on the cloud still poses security risks Most of the cyberattacks on cloud environments have been due to compromised credentials, says Centrify. Become a supporter of IT Security News and help us…
How ransomware is evolving as a threat to organizations
Read the original article: How ransomware is evolving as a threat to organizations Cybercriminals know they can make money with ransomware and keep getting bolder with their demands, says Palo Alto Networks’ Unit 42. Become a supporter of IT…
Bitwarden: How to enable biometric login
Read the original article: Bitwarden: How to enable biometric login If you’d rather not have to enter your password every time you open the Bitwarden password manager on your mobile device, Jack Wallen shows you how to enable biometric login.…
McAfee uncovers espionage campaign aimed at major telecommunication companies
Read the original article: McAfee uncovers espionage campaign aimed at major telecommunication companies The security company said the attacks were attributed to RedDelta and Mustang Panda, both of which are allegedly based in China. Become a supporter of IT…
Mamma Mia! Compromised passwords are filled with popular music artists
Read the original article: Mamma Mia! Compromised passwords are filled with popular music artists All apologies, but if you use your favorite band as part of your password it’s time to turn around and try something else. Become a…
99.2% of US government Android users are running outdated OS versions
Read the original article: 99.2% of US government Android users are running outdated OS versions Some versions of Android in use by government employees go all the way back to 2017’s Android 8, and that’s a huge cybersecurity problem. …
Why traditional malware detection can’t stop the latest security threats
Read the original article: Why traditional malware detection can’t stop the latest security threats Isolating your hardware and your applications is a more effective way to prevent malware from infecting your critical endpoints, says HP. Become a supporter of…
Security firm releases free Purple Knight tool to spot weaknesses in Active Directory
Read the original article: Security firm releases free Purple Knight tool to spot weaknesses in Active Directory The AD report card scores the security of Group Policies, Kerberos security and AD infrastructure. Become a supporter of IT Security News…
Not quite “The Purge,” but 70% adopted home tech to increase security amid pandemic
Read the original article: Not quite “The Purge,” but 70% adopted home tech to increase security amid pandemic A Home.com survey found that while most understood the value and necessity of the investment in new tools and gadgets, there were…
Remote hiring: Cybersecurity best practices
Read the original article: Remote hiring: Cybersecurity best practices Subtle cybersecurity concerns are in play when vetting candidates remotely for a position that entails working remotely. Learn what they are and what to do about them. Become a supporter…
Forrester: These 5 threats could hobble pandemic recovery
Read the original article: Forrester: These 5 threats could hobble pandemic recovery If businesses are going to successfully navigate the road ahead they’ll need to focus on these security problems and attack vectors. Become a supporter of IT Security…
How malware is targeting the new Apple Macs
Read the original article: How malware is targeting the new Apple Macs As the new kid on the block, the M1 chip-based Mac is already on the radar of malware writers, says Kaspersky. Become a supporter of IT Security…
Organizations are more likely to purchase tech and services from vendors demonstrating transparency
Read the original article: Organizations are more likely to purchase tech and services from vendors demonstrating transparency A global study by Intel indicates 73% of respondents gravitate toward companies that proactively find, mitigate and communicate security vulnerabilities. Become a…
How to use Bitwarden’s new Send feature
Read the original article: How to use Bitwarden’s new Send feature What is probably the best open source password manager on the market has added a new feature that will make using the tool even better. Become a supporter…
How to block users from setting up their own cron jobs on Linux
Read the original article: How to block users from setting up their own cron jobs on Linux Jack Wallen shows you how to gain a bit more security on your Linux servers by blocking users from adding cron jobs. …
How to remove legacy communication services on Linux
Read the original article: How to remove legacy communication services on Linux To keep your Linux servers and desktops as secure as possible, you should check for (and remove) legacy communication services. Jack Wallen shows you how. Become a…
CEOs express strong optimism for global growth this year
Read the original article: CEOs express strong optimism for global growth this year While they remain anxious about external threats like health crises and cyber threats, concerns about climate change are low, PwC survey finds. Become a supporter of…
Android: How to quickly block spam SMS
Read the original article: Android: How to quickly block spam SMS Jack Wallen shows you how easy it is to block and report spam SMS messages on the Android platform. Become a supporter of IT Security News and help…
Do a plug-in audit and improve visibility into remote workers’ systems to avoid Gootloader attack
Read the original article: Do a plug-in audit and improve visibility into remote workers’ systems to avoid Gootloader attack Security analysts and an SEO expert explain how this new approach uses legitimate websites to trick users into downloading infected files.…
How to install and configure 2FA on AlmaLinux
Read the original article: How to install and configure 2FA on AlmaLinux Jack Wallen walks you through the process of enabling two-factor authentication on the new fork of CentOS, AlmaLinux. Become a supporter of IT Security News and help…
Hackers update Gootkit RAT to use Google searches and discussion forums to deliver malware
Read the original article: Hackers update Gootkit RAT to use Google searches and discussion forums to deliver malware Security analysts and an SEO expert explain how this new approach uses legitimate websites to trick users into downloading infected files. …
Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security
Read the original article: Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security After a breach at a Florida treatment facility, tap water security is front and center. In the digital age, there are…
A new Linux Foundation open source signing tool could make secure software supply chains universal
Read the original article: A new Linux Foundation open source signing tool could make secure software supply chains universal sigstore could eliminate the headaches associated with current software signing technology through public ledgers. Become a supporter of IT Security…
Employers aren’t training staff to use new tech tools. Employees are paying the price
Read the original article: Employers aren’t training staff to use new tech tools. Employees are paying the price Organizations have invested millions in new technology over the past year, yet fewer than one in 10 businesses have trained staff in…
Microsoft Exchange hack: Why so many enterprises still run their own Exchange servers
Read the original article: Microsoft Exchange hack: Why so many enterprises still run their own Exchange servers Commentary: Enterprises try their best to secure their data, but running on-premises mail servers arguably doesn’t do this. So why do they do…
How cybercrime groups are exploiting the latest Microsoft Exchange flaws
Read the original article: How cybercrime groups are exploiting the latest Microsoft Exchange flaws Criminals have been targeting organizations that run Exchange hoping to breach ones that haven’t patched the latest bugs, says ESET. Become a supporter of IT…
Startup uses NLP and AI to make software security reviews less painful
Read the original article: Startup uses NLP and AI to make software security reviews less painful Apiiro creates user profiles and analyzes a company’s code base to spot high-risk changes and replace manual risk assessments with on-the-fly analysis. Become…