Sat.Aug 20, 2016 - Fri.Aug 26, 2016

article thumbnail

Ransomware: The smart person's guide

Tech Republic Security

This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.

article thumbnail

Stolen iPhones could eventually capture photo and fingerprint of thieves

Tech Republic Security

Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.

103
103
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: 82% of hospitals fear they aren't prepared for mobile cyberattacks

Tech Republic Security

As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.

Mobile 99
article thumbnail

Rio Olympics 2016: How hackers are still using the games to scam businesses

Tech Republic Security

Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.

Scams 96
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Cloud Security Alliance releases top 100 big data best practices report

Tech Republic Security

The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.

article thumbnail

Millions of devices are still vulnerable, says researcher who discovered Stagefright

Tech Republic Security

The Stagefright vulnerability on Android phones was one of the top security stories of 2015. Here's where it stands now and how users can protect their devices.

88

More Trending

article thumbnail

SpyNote malware: One more reason to never sideload Android apps

Tech Republic Security

Jack Wallen explains why the recently discovered SpyNote malware threat should make you squeamish about sideloading Android apps.

Malware 95
article thumbnail

Every WordPress site needs this security plugin

Tech Republic Security

If you need to secure a WordPress site, check out Wordfence. This all-in-one security tool can keep your site and its data safe from malice.

89
article thumbnail

Free tool helps your IT team assess phishing risks

Tech Republic Security

Duo Insight lets IT teams run internal phishing simulations to identify potential security weaknesses and make the case for investing in stronger solutions and more user training.

article thumbnail

Tresorit: An enterprise cloud standout with security features galore

Tech Republic Security

Tresorit is one of the best cloud solutions contributing writer Jack Wallen has tried in a long time. Find out what makes this enterprise cloud offering a dazzler.

66
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

How to increase your DKIM key to 2048 bits for Google Apps

Tech Republic Security

Checking the length of your DKIM key and generating a new, 2048-bit one could help prevent spoofing and spam. Here's the process for Google Apps admins.

68
article thumbnail

Chronicled releases open registry for IoT built on blockchain

Tech Republic Security

San Francisco's Chronicled announced that it has partnered with Ethereum to provide a registry for connected devices built on blockchain technology.

IoT 64