| Security News from 'TechRepublic' |
| Showing 'Security News from 'TechRepublic'' from 1 to 10|
| |Microsoft: This Is How To Protect Your Machine-learning Applications Understanding failures and attacks can help us build safer AI applications.
| |Microsoft Office 365: This New Feature Will Keep You Safe From Malware-filled Documents Application Guard for Office and Safe Documents will make phishing attacks harder and the Office experience better for users, starting with Office 365 Pro Plus and E5 licences.
| |Mozilla Ranks Video Call Apps By Security And Privacy Features 12 of the 15 most popular video call apps meet Mozillas Minimum Security Standards, according to a new report.
| |Cybersecurity Professionals Are Being Repurposed During COVID-19 Pandemic 47% of respondents have been temporarily moved to assist with IT-related tasks during remote work, (ISC)2 survey finds.
| |Tech Company Offers Free Online Cybersecurity Training Courses Conscious of the state of employment during the pandemic, as well as after, Fortinet offers an opportunity to build skill sets from home.
| |Research Shows Malware Is Easy To Buy, Own, And Deploy With just a few Bitcoins and a quick search of Dark Web marketplaces, bad actors can become the owners of powerfully malicious tools.
| |Android Ransomware Attack Spoofs The FBI With Accusation Of Pornography The attack accuses victims of possessing pornography, encrypts all files on the device, and then instructs them to pay a fine to unlock the data, according to Check Point Research.
| |One Billion Certificates Later, Lets Encrypts Crazy Dream To Secure The Web Is Coming True Commentary: Lets Encrypt cofounder Josh Aas is quick to deflect praise, but each of us has a great deal to thank him for, as 85% of page loads are now secured.
| |How To Protect Your Data Against The Mail.app Vulnerability In Apple Devices A recent bug discovered can allow your device to be compromised through Apples default Mail application, but until a patch is released, follow these steps to protect yourself.
| |How To Prevent Unattended SSH Connections From Remaining Connected Preventing idle SSH sessions from remaining connected is an easy way to add a bit more security to secure shell. Find out how.
| 1 2 3 4 5 6 7 8 9 10 Older » |