Tags » CyberSecurity

Adding an extra layer of security to your online accounts is a fundamental step to protect your digital life from hackers, but what’s the point if the new methods are just as vulnerable as the old ones? 19 more words

Tech

Linux.MulDrop.14 is a Linux worm that seeks out networked Raspberry Pi systems with default root passwords; after taking them over and ZMap and sshpass, it begins mining an unspecified cryptocurrency, creating riches for the malware’s author and handing you the power-bill. 12 more words

Tech

Lack of clarity hinders cybersecurity insurance investment

Despite the increase in data breaches and their costs, many enterprise security professionals say their organizations don’t currently have cybersecurity insurance. But that may be changing. 358 more words

Security

Healthcare industry still concerned about medical device hacking

A Ponemon survey released last week, Medical Device Security: An Industry Under Attack and Unprepared to Defend, shows that many in the healthcare industry still believe medical devices are primed for, and defenseless to, attack. 507 more words

Security

Stay safe: Massive database of stolen passwords surfaces

Every few months, it seems, a big trove of usernames and passwords surfaces somewhere.

This week it was uncovered by Bob Diachenko of Kromtech Security Research Center. 309 more words

Workplace

Gestor de contraseñas: ¿herramienta segura o vulnerable?

Seamos realistas: las contraseñas no son sólo un incordio, encima ni siquiera logran ser seguras. El ciudadano medio tiene docenas de combinaciones de nombre de usuario y contraseña que debe recordar y muchos llegan a acumular cientos de combinaciones que no utilizan. 555 more words

Applications

Logiciels de gestion de mot de passe : outil sécurisé ou point faible ?

Soyons honnêtes: au-delà du fait que se souvenir d’eux est parfois un casse-tête, les mots de passe ne sont pas en soi les verrous les plus efficaces pour protéger nos données. 781 more words

Applications