Sat.Jun 25, 2016 - Fri.Jul 01, 2016

article thumbnail

1.2 million infected: Android malware 'Hummer' could be biggest trojan ever

Tech Republic Security

Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps.

Malware 113
article thumbnail

Approach IoT security as a system design problem

Tech Republic Security

Don't let IoT security be an afterthought. The National Institute of Science and Technology (NIST) suggests integrating systems security engineering at the start of an IoT project.

IoT 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Report: New security threats costing businesses $1 million an incident, flash performance suffers

Tech Republic Security

A new report from EMC shows that businesses are tackling traditional cybersecurity issues better, but they are failing to address emerging threats.

article thumbnail

How to set up Authy on multiple devices for more convenient two-factor authentication

Tech Republic Security

One device to hand out two-factor authentication tokens isn't always enough. Learn how to use Authy on multiple devices so those tokens are always at the ready.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Why antivirus programs have become the problem, not the solution

Tech Republic Security

Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers.

Antivirus 113
article thumbnail

How to install SparkleShare on Ubuntu and connect it to GitHub

Tech Republic Security

Collaboration and remote sync are a necessity for developers. Learn how to make the process easier by using SparkleShare to connect to a GitHub repository.

94

More Trending

article thumbnail

Quantum physics meets IT security

Tech Republic Security

It's hard enough for IT security managers to keep with the latest in conventional computing. Cloud Security Alliance and the US government are trying to make sure you don't need a physics degree, too.

article thumbnail

Skyrocketing Android ransomware has quadrupled over past year, says new report

Tech Republic Security

A Kaspersky Lab reports Android ransomware is booming, quadrupling over the past year alone, shedding light on the growing problem of non-PC ransomware.

article thumbnail

Developers will cheat on their cloud provider for better security, new survey says

Tech Republic Security

Security is the top reason developers consider jumping to a new cloud, along with better reliability and a better user experience, according to a new survey by Evans Data.

73
article thumbnail

Research: Apple rated highest for security on mobile devices

Tech Republic Security

Mobile devices are almost universal in the enterprise in 2016. Tech Pro Research conducted a survey to see what devices employees are using for work, and how safe these devices are.

Mobile 72
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.