Loading...


Internet Security Directory
TechRepublic: 2016

-

TechRepublic: The state of malware: 4 big takeaways from AV-TEST's 2016 report

Votes:20 Comments:0
The new report details increased risks to Android and Apple products and the top 10 Windows malware programs of 2016. Here's what your business needs to know to stay safe. By Alison DeNisco Novemb READ MORE
http://www.techrepublic.com/article/the-state-of-malware-4-big-takeawa...

TechRepublic: 3 inexpensive steps to secure IoT

Votes:34 Comments:0
IoT devices powered the attack against Dyn, causing major disruptions to certain web properties. Follow these three steps to secure your IoT devices. By Keith Townsend October 26, 2016 The rece READ MORE
http://www.techrepublic.com/article/3-inexpensive-steps-to-secure-iot/

TechRepublic: The security tsunami of the Internet of Things is coming, are you ...

Votes:33 Comments:0
Intel Security's Scott Montgomery took the stage at Structure Security to explain some of the core security and privacy challenges that are coming with the Internet of Things. By Conner Forrest Se READ MORE
http://www.techrepublic.com/article/the-security-tsunami-of-the-intern...

TechRepublic: Malware downloaded every 81 seconds, says new Check Point security...

Votes:27 Comments:0
A new report from Check Point claims that the average day in an enterprise organization is rife with malware and malicious applications. By Conner Forrest September 20, 2016 A new report, relea READ MORE
http://www.techrepublic.com/article/malware-downloaded-every-81-second...

TechRepublic: Ransomware: The smart person's guide

Votes:22 Comments:0
This guide covers the history of ransomware, the systems being targeted in ransomware attacks, and what you can do to avoid paying a ransom in the event of an attack. By James Sanders August 27, 2 READ MORE
http://www.techrepublic.com/article/ransomware-the-smart-persons-guide...

TechRepublic: How to remove pesky malware from your PC with Windows Defender Off...

Votes:34 Comments:0
Some malware is really good at hiding itself. You can thwart those malicious plans by running Windows Defender in offline mode. By Mark Kaelin August 24, 2016 When it comes to your personal com READ MORE
http://www.techrepublic.com/article/how-to-remove-pesky-malware-from-y...

TechRepublic: Zero Days: Why the disturbing Stuxnet documentary is a must-see

Votes:28 Comments:0
Zero Days is a documentary by Oscar-winning filmmaker Alex Gibney about the cyberwarfare Pandora's Box that was opened with the Stuxnet malware. Find out why Jack Wallen highly recommends the film. READ MORE
http://www.techrepublic.com/article/zero-days-why-the-disturbing-stuxn...

TechRepublic: How to avoid ransomware attacks: 10 tips

Votes:5 Comments:0
As ransomware increasingly targets healthcare organizations, schools and government agencies, security experts offer advice to help IT leaders prepare and protect. By Alison DeNisco July 27, 2016 READ MORE
http://www.techrepublic.com/article/10-tips-to-avoid-ransomware-attack...

TechRepublic: HummingBad malware infects 10 million Android devices, millions mo...

Votes:20 Comments:0
A new malware called HummingBad, associated with Chinese cyber criminals Yingmob, has infected millions of devices and brings in millions of dollars of fake ad revenue. By Conner Forrest July 5, 2 READ MORE
http://www.techrepublic.com/article/hummingbad-malware-infects-10-mill...

TechRepublic: Skyrocketing Android ransomware has quadrupled over past year, say...

Votes:16 Comments:0
A Kaspersky Lab reports Android ransomware is booming, quadrupling over the past year alone, shedding light on the growing problem of non-PC ransomware. By Conner Forrest June 30, 2016 It's bee READ MORE
http://www.techrepublic.com/article/skyrocketing-android-ransomware-ha...

TechRepublic: Why antivirus programs have become the problem, not the solution

Votes:40 Comments:0
Staggeringly poor programming and security practices have made antivirus programs a gaping security hole in millions of computers. By James Sanders June 30, 2016 This week, Tavis Ormandy of Goo READ MORE
http://www.techrepublic.com/article/why-antivirus-programs-have-become...

TechRepublic: 1.2 million infected: Android malware 'Hummer' could be biggest tr...

Votes:29 Comments:0
Security researchers recently issued warnings against a trojan family known as Hummer, which affects more than a million phones by installing malware and unwanted apps. By Conner Forrest June 30, READ MORE
http://www.techrepublic.com/article/1-2-million-infected-android-malwa...

TechRepublic: Be on the lookout for keystroke-logging USB chargers

Votes:14 Comments:0
USB devices resembling phone chargers might actually be keystroke loggers stealing data. Learn more about this threat and how to protect against it. By Scott Matteson June 8, 2016 The risk of m READ MORE
http://www.techrepublic.com/article/be-on-the-lookout-for-keystroke-lo...

TechRepublic: 5 more ways to secure OS X

Votes:15 Comments:0
Apple devices aren't impervious to threats against your data. Here are 5 more methods for keeping your information safe. By Jesus Vigo May 30, 2016 Last week we brought you five ways to secure READ MORE
http://www.techrepublic.com/article/5-more-ways-to-secure-os-x/

TechRepublic: 5 ways to secure OS X

Votes:39 Comments:0
With OS X security exploits on the rise, Jesus Vigo takes a look at 5 ways to better protect your Mac from malware infections and data loss. By Jesus Vigo May 27, 2016 Cybersecurity is at an al READ MORE
http://www.techrepublic.com/article/5-ways-to-secure-os-x/

TechRepublic: An insider's look at iOS security

Votes:24 Comments:0
Apple's battle with the FBI portrays them as a security hero going to great lengths to protect user privacy, but our beloved iPhones may not be as secure as many believe. By Scott Matteson April 2 READ MORE
http://www.techrepublic.com/article/an-insiders-look-at-ios-security/

TechRepublic: Mac OS X ransomware: How KeRanger is a shadow of malware to come

Votes:40 Comments:0
The design of KeRanger demonstrates how attackers plan to make it even harder for victims of ransomware not to pay up. By Nick Heath April 14, 2016 Hackers seeking to hold computer users to ran READ MORE
http://www.techrepublic.com/article/mac-os-x-ransomware-how-keranger-i...

TechRepublic: Security experts: what's wrong with Internet of Things security, a...

Votes:16 Comments:0
From malware to eavesdropping, millions of connected devices around the world are vulnerable to attacks. Two security analysts explain how the IoT can be hacked, how to protect yourself. By Dan Pat READ MORE
http://www.techrepublic.com/article/security-experts-whats-wrong-with-...

TechRepublic: Fine-tune OS X security and privacy settings

Votes:21 Comments:0
OS X offers a range of customizable security and privacy options. Here's a quick tutorial on what's available. By Erik Eckel March 18, 2016 It's no surprise that the Apple/FBI story is making h READ MORE
http://www.techrepublic.com/article/fine-tune-os-x-security-and-privac...

TechRepublic: Malware developers hide in plain sight in online sandboxes

Votes:6 Comments:0
Malware analysis using online sandboxes is another example of technology designed to assist good guys that ends up helping bad guys as much if not more. By Michael Kassner February 10, 2016 Onl READ MORE
http://www.techrepublic.com/article/malware-developers-hide-in-plain-s...

TechRepublic: Phishing gets more dangerous: New report analyzes the weapons of c...

Votes:15 Comments:0
On Wednesday, Wombat Security Technologies released a report on the state of phishing attacks. Here's what you need to know. By Conner Forrest January 27, 2016 On Wednesday, Wombat Security Tec READ MORE
http://www.techrepublic.com/article/phishing-gets-more-dangerous-new-r...
2016 Tech Republic articles
Sites of Interest
-
Subscribe



Search
Search
Search
Search
Login
Privacy Policy