Sat.Aug 20, 2016 - Fri.Aug 26, 2016

article thumbnail

Ransomware: The smart person's guide

Tech Republic Security

This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

article thumbnail

SpyNote malware: One more reason to never sideload Android apps

Tech Republic Security

Jack Wallen explains why the recently discovered SpyNote malware threat should make you squeamish about sideloading Android apps.

Malware 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Stolen iPhones could eventually capture photo and fingerprint of thieves

Tech Republic Security

Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.

113
113
article thumbnail

Report: 82% of hospitals fear they aren't prepared for mobile cyberattacks

Tech Republic Security

As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.

Mobile 113
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Rio Olympics 2016: How hackers are still using the games to scam businesses

Tech Republic Security

Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.

Scams 113
article thumbnail

Blockchain could bring electronic voting to Australia by 2017

Tech Republic Security

Australia's government-owned postal service recently announced plans to test digital voting via blockchain technology to increase efficiency.

LifeWorks

More Trending

article thumbnail

Millions of devices are still vulnerable, says researcher who discovered Stagefright

Tech Republic Security

The Stagefright vulnerability on Android phones was one of the top security stories of 2015. Here's where it stands now and how users can protect their devices.

113
113
article thumbnail

Cloud Security Alliance releases top 100 big data best practices report

Tech Republic Security

The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.

Big data 112
article thumbnail

How to increase your DKIM key to 2048 bits for Google Apps

Tech Republic Security

Checking the length of your DKIM key and generating a new, 2048-bit one could help prevent spoofing and spam. Here's the process for Google Apps admins.

102
102
article thumbnail

Tresorit: An enterprise cloud standout with security features galore

Tech Republic Security

Tresorit is one of the best cloud solutions contributing writer Jack Wallen has tried in a long time. Find out what makes this enterprise cloud offering a dazzler.

99
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Free tool helps your IT team assess phishing risks

Tech Republic Security

Duo Insight lets IT teams run internal phishing simulations to identify potential security weaknesses and make the case for investing in stronger solutions and more user training.

article thumbnail

Chronicled releases open registry for IoT built on blockchain

Tech Republic Security

San Francisco's Chronicled announced that it has partnered with Ethereum to provide a registry for connected devices built on blockchain technology.

IoT 94