Sat.Apr 30, 2016 - Fri.May 06, 2016

article thumbnail

Computer science teachers need cybersecurity education says CSTA industry group

Tech Republic Security

The Computer Science Teachers Association (CTSA) is working on a cybersecurity certification program for computer science educators, so they can better teach students about computer security.

Education 113
article thumbnail

SMBs: Most Likely To Be Hacked?

NopSec

Most small and medium business owners believe that cyber criminals only target large businesses and corporations. They couldn’t be more wrong. In 2015, 62% of all data breaches were against SMBs according to IBM and the Ponemon Institute. Considering that a majority of business entities in the United States are small and medium businesses, and most of them do not have robust information security programs in place, there is definitely an incentive in targeting SMBs instead.

Hacking 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LAPD hacks iPhone 5s, proves they don't need Apple backdoor

Tech Republic Security

The LAPD recently hacked into an iPhone 5s involved in a very public murder trial. This news could prove a potential roadblock for backdoor legislation.

Hacking 109
article thumbnail

How to easily encrypt/decrypt a file in Linux with gpg

Tech Republic Security

Stop your search for an easy way to encrypt and decrypt files in Linux -- the built-in gpg tool will do the trick.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

ImageMagick users beware: Multiple vulnerabilities leave servers compromised

Tech Republic Security

The popular image processing library ImageMagick has a number of critical vulnerabilities currently being used in the wild, allowing attackers to gain control of servers.

63
article thumbnail

How public cloud providers are making security a non-issue for app developers

Tech Republic Security

Developers would often rather write apps than secure them, but public cloud providers can help them do both.

76