Sat.Apr 30, 2016 - Fri.May 06, 2016

article thumbnail

How to easily encrypt/decrypt a file in Linux with gpg

Tech Republic Security

Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.

article thumbnail

SMBs: Most Likely To Be Hacked?

NopSec

Most small and medium business owners believe that cyber criminals only target large businesses and corporations. They couldn’t be more wrong. In 2015, 62% of all data breaches were against SMBs according to IBM and the Ponemon Institute. Considering that a majority of business entities in the United States are small and medium businesses, and most of them do not have robust information security programs in place, there is definitely an incentive in targeting SMBs instead.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Computer science teachers need cybersecurity education says CSTA industry group

Tech Republic Security

The Computer Science Teachers Association (CTSA) is working on a cybersecurity certification program for computer science educators, so they can better teach students about computer security.

Education 114
article thumbnail

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

Tech Republic Security

The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.

Hacking 113
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

How public cloud providers are making security a non-issue for app developers

Tech Republic Security

Developers would often rather write apps than secure them, but public cloud providers can help them do both.

108
108
article thumbnail

ImageMagick users beware: Multiple vulnerabilities leave servers compromised

Tech Republic Security

The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.

84