perm_phone_msgUNDER ATTACK? S.O.S. LINE 0114 354 0054

Top Categories

Spotlight

today25/11/2020

Cyber security TechRepublic

Top 5 business sectors targeted by ransomware

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware. You may have heard me mention ransomware before. You know, the malware that locks up your systems and asks you to pay money in [...]

Top Voted
Sorry, there is nothing for the moment.

TechRepublic.com

340 Results / Page 1 of 38

Background

today25/11/2020

close

Cyber security TechRepublic

Top 5 business sectors targeted by ransomware

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware. You may have heard me mention ransomware before. You know, the malware that locks up your systems and asks you to pay money in ...

today25/11/2020

close

Cyber security TechRepublic

5 business sectors that are ransomware targets

5 business sectors that are ransomware targets Length: 2:38 | Nov 25, 2020 Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware. See the original article here: TechRepublic

today25/11/2020

close

Cyber security TechRepublic

Banks looking to confidential computing for solutions to money laundering, theft, and fraud

Tech companies are offering this emerging technology to help financial institutions secure data while it is being processed. Image: iStockphoto/BrianAJackson Financial institutions and banks are struggling more than ever to mitigate digital theft, fraud, and money laundering activities. Almost all banks are subject to Know Your Customer regulations that are ...

today25/11/2020

close

Cyber security TechRepublic

Linux: How to recover deleted files with testdisk

Linux: How to recover deleted files with testdisk Length: 2:52 | Nov 24, 2020 If you’ve had files deleted by a hacker or you’ve accidentally removed them, Jack Wallen shows you how to recover that missing data with a handy tool called testdisk. See the original article here: TechRepublic

today24/11/2020

close

Cyber security TechRepublic

How to use the Google One VPN on Android

If you’re looking for the best Android VPN, Jack Wallen thinks Google’s take on the service might be the perfect fit for those wanting both performance and security. Image: CNET Did you know that Google had a VPN for Android? It’s called Google One VPN and it’s secure, fast, and ...

today23/11/2020

close

Cyber security TechRepublic

Malicious Google Play apps caught masquerading as Minecraft mods

The Android apps promised Minecraft modifications but instead delivered intrusive ads aimed at kids and teenagers, says Kaspersky. Image: Jack Wallen/TechRepublic Malicious Android apps have a habit of sneaking their way into the Google Play store without getting caught by the usual security protections. One tactic that often seems to ...

today20/11/2020

close

Cyber security TechRepublic

Quantum computing: A cheat sheet

IBM, Honeywell, and Intel are just three companies leading the way in building quantum machines as well as the algorithms and controls to run them. Learn about possible business use cases for quantum. Quantum computing–considered to be the next generation of high-performance computing–is a rapidly-changing field that receives equal parts ...

today20/11/2020

close

Cyber security TechRepublic

Study finds 31% of third-party vendors could cause significant damage to organizations if breached

Risk professionals relying on questionnaire-based assessments could be in for a rude awakening, according to Mastercard’s RiskRecon and the Cyentia Institute. With major companies like Marriott, Instagram, P&N Bank, and General Electric experiencing breaches related to attacks on vendors this year, it is increasingly more important for enterprises to have ...