Sat.Jun 18, 2016 - Fri.Jun 24, 2016

article thumbnail

Is the Intel Management Engine a backdoor?

Tech Republic Security

Is Intel's Management Engine a backdoor for security groups and hackers, or just a feature created to aid businesses? Jack Wallen dives in and draws his conclusions.

article thumbnail

Clinton allegedly hacked again, and documents leaked from DNC attack

Tech Republic Security

The Clinton Foundation's network was allegedly hacked late Tuesday, while a variety of documents from last week's DNC hack were leaked simultaneously, pushing cybersecurity toward center stage.

Hacking 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hurricane preparedness gets high tech in Fort Myers, Florida

Tech Republic Security

In the heart of Florida's hurricane country, Lee County's Emergency Operations Center uses cutting-edge networking and communications solutions to prepare for any emergency.

95
article thumbnail

Chinese cybersecurity breaches drop 90%, but expert warns not to let guard down

Tech Republic Security

A report from US network security FireEye recently showed that breaches attributed to China-based groups dropped dramatically over the past two years.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Election Tech: What happens when presidential candidates are hacked

Tech Republic Security

The DNC and Clinton Foundation were targeted recently by hacker groups. Cybersecurity experts explain why organizations are targeted, the value of data, and how to protect yourself and your business.

Hacking 67