Sat.Jun 25, 2016 - Fri.Jul 01, 2016

article thumbnail

Approach IoT security as a system design problem

Tech Republic Security

Don't let IoT security be an afterthought. The National Institute of Science and Technology (NIST) suggests integrating systems security engineering at the start of an IoT project.

IoT 113
article thumbnail

1.2 million infected: Android malware 'Hummer' could be biggest trojan ever

Tech Republic Security

Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps.

Malware 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to set up Authy on multiple devices for more convenient two-factor authentication

Tech Republic Security

One device to hand out two-factor authentication tokens isn't always enough. Learn how to use Authy on multiple devices so those tokens are always at the ready.

article thumbnail

Why antivirus programs have become the problem, not the solution

Tech Republic Security

Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.

Antivirus 114
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Google My Activity site reveals all the data that's been collected about your online habits

Tech Republic Security

Google recently launched a new page called My Activity that shows you a history of your online activities and interactions with its products.

113
113
article thumbnail

How to install SparkleShare on Ubuntu and connect it to GitHub

Tech Republic Security

Collaboration and remote sync are a necessity for developers. Learn how to make the process easier by using SparkleShare to connect to a GitHub repository.

113
113

LifeWorks

More Trending

article thumbnail

Skyrocketing Android ransomware has quadrupled over past year, says new report

Tech Republic Security

A Kaspersky Lab reports Android ransomware is booming, quadrupling over the past year alone, shedding light on the growing problem of non-PC ransomware.

article thumbnail

Quantum physics meets IT security

Tech Republic Security

It's hard enough for IT security managers to keep with the latest in conventional computing. Cloud Security Alliance and the US government are trying to make sure you don't need a physics degree, too.

article thumbnail

Developers will cheat on their cloud provider for better security, new survey says

Tech Republic Security

Security is the top reason developers consider jumping to a new cloud, along with better reliability and a better user experience, according to a new survey by Evans Data.

108
108
article thumbnail

Research: Apple rated highest for security on mobile devices

Tech Republic Security

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

Mobile 107
article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.