Sat.Aug 13, 2016 - Fri.Aug 19, 2016

article thumbnail

How to avoid falling victim to Android app scams on Google Play

Tech Republic Security

Android security is a serious problem, and the Play store is a hotbed of malware. Here are a few simple tips for avoiding the wrong apps when you go looking for new ones.

Scams 107
article thumbnail

Office of the Privacy Commissioner of Canada discusses its investigation against Compu-Finder

Privacy and Cybersecurity Law

The Office of the Privacy Commissioner of Canada (OPC) recently hosted a knowledge session to stakeholders to discuss its recent […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to mitigate ransomware, DDoS attacks, and other cyber extortion threats

Tech Republic Security

Ransomware and other forms of cyber extortion are effective moneymakers for the bad guys. Learn why, and how not to fall prey to digital extortionists.

article thumbnail

Hackers claim to have stolen cyberweapons from NSA, demand 1 million Bitcoin in exchange

Tech Republic Security

Hacking group the Shadow Brokers claim to have hacked a group widely believed to be the NSA, and will release that group's hacking tools in exchange for Bitcoin.

Hacking 103
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

How to enable server-side encryption in Nextcloud

Tech Republic Security

Out of the box, Nextcloud servers do not run with server-side encryption. Follow these steps to enable an extra layer of security for Nextcloud.

article thumbnail

WinZip 5 Mac adds impressive encryption and cloud features to the file-compression app

Tech Republic Security

WinZip 5 offers more than just simple Mac file compression license compliance. It comes with new encryption, password protection, image resizing, and link-sharing features.

More Trending

article thumbnail

DroidOL: Android malware detection based on online machine learning

Tech Republic Security

Discover how researchers figured out a way to improve Android malware detection with machine learning that is continuously and automatically trained online.

Malware 74
article thumbnail

Bloatware as a security risk: Researchers' innovative ways to combat the scourge

Tech Republic Security

Unnecessary code in software provides digital criminals more opportunities to compromise computing devices, according to researchers. Read about their solutions to bloatware.

Risk 67
article thumbnail

Cloud banking apps offer both risks and rewards

Tech Republic Security

Banks are increasingly issuing warnings to users of banking aggregators such as Personal Capital and Intuit's Mint.com under the guise of security risks, but that's not the whole story.

Banking 65
article thumbnail

SECURED moves IoT and BYOD security to the network

Tech Republic Security

Researchers figured out a way to move the responsibility of securing millions of BYOD and IoT devices to the network. Get details about the SECURED project.

IoT 70
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Infographic and interview: The explosion of cybercrime and how to protect your business

Tech Republic Security

A new chart details how cybercrime ballooned in the past decade. Cybersecurity expert Ron Schlecht explains how even small breaches can cost enterprise and SMB companies millions.