Ransomware: The smart person's guide
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Tech Republic Security
AUGUST 22, 2016
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack.
Tech Republic Security
AUGUST 26, 2016
Apple recently patented a feature that could trigger the iPhone to capture and store biometric data, images, audio, and video of a user if unauthorized use is detected.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
AUGUST 23, 2016
As more hospitals deploy mobile devices for clinical communications, staff and IT leaders worry that cybercriminals will hack them and steal medical records.
Tech Republic Security
AUGUST 24, 2016
Though the Olympic games have ended for the summer, cybercriminals are still using stories from the games to target companies. Here's how to stay safe.
Advertisement
How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.
Tech Republic Security
AUGUST 26, 2016
The thoroughly detailed report breaks 100 best practices down into 10 categories. We've summarized them into the biggest takeaways IT professionals need to know about.
Tech Republic Security
AUGUST 22, 2016
The Stagefright vulnerability on Android phones was one of the top security stories of 2015. Here's where it stands now and how users can protect their devices.
Cyber Security Informer brings together the best content for cyber security professionals from the widest variety of industry thought leaders.
Tech Republic Security
AUGUST 23, 2016
Jack Wallen explains why the recently discovered SpyNote malware threat should make you squeamish about sideloading Android apps.
Tech Republic Security
AUGUST 25, 2016
If you need to secure a WordPress site, check out Wordfence. This all-in-one security tool can keep your site and its data safe from malice.
Tech Republic Security
AUGUST 26, 2016
Duo Insight lets IT teams run internal phishing simulations to identify potential security weaknesses and make the case for investing in stronger solutions and more user training.
Tech Republic Security
AUGUST 24, 2016
Tresorit is one of the best cloud solutions contributing writer Jack Wallen has tried in a long time. Find out what makes this enterprise cloud offering a dazzler.
Advertiser: Revenera
In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.
Tech Republic Security
AUGUST 24, 2016
Checking the length of your DKIM key and generating a new, 2048-bit one could help prevent spoofing and spam. Here's the process for Google Apps admins.
Tech Republic Security
AUGUST 24, 2016
San Francisco's Chronicled announced that it has partnered with Ethereum to provide a registry for connected devices built on blockchain technology.
Let's personalize your content