-
Cybercriminals shop for admin access to healthcare portals
Administrator access to backend systems is becoming the holy grail for attackers.
-
What's powering the unlikely rise of the millionaire hacker?
Six hackers made over $1 million this year for squashing security bugs, yet just five years ago this possibility seemed remote at best.
-
Cybercriminals set sights on bot attacks and mobile apps
The past six months have seen a 13% increase in human-initiated cyberattacks. Here's what cybercriminals are targeting.
-
Phishing scams targeting Mac users on the rise with 1.6 million attacks in 2019
Kaspersky caught 1.6 million phishing attacks disguised as the Apple brand in the first six months of 2019.
-
JPMorgan's Athena has 35 million lines of Python code, and won't be updated to Python 3 in time
With 35 million lines of Python code, the Athena trading platform is at the core of JPMorgan's business operations. A late start to migrating to Python 3 could create a security risk.
-
How data breaches are hurting small businesses
Some 30% of consumers surveyed said they would never again use a small business that suffered a data breach, according to a new report from Bank of America Merchant Services.
-
How to enable DNS-over-HTTPS in Firefox
If you're looking to gain as much privacy and security from the Firefox browser, you might want to enable DNS-over-HTTPS.
-
How to prevent ClipIt clipboard manager from copying sensitive information from apps
If you use a clipboard manager, you need to make sure to exclude certain applications. Find out how this is done with ClipIt.
-
How to upgrade the firmware on your Logitech dongle
Don't let your Logitech dongles remain vulnerable. Upgrade the firmware and be safe.
-
What is fileless malware and how do you protect against it?
Scanning files you open and save isn't enough to catch malware these days. Here's how Microsoft Defender tools can help you catch attacks that are missed by traditional security software.
-
IT pros worry about humans but invest in data and cloud security
A survey of 1,000 IT pros reveals plans for 2020 security spending.
-
Gartner proposes framework to manage regulations for our digital society
The myriad rules and regulations that govern data protection and privacy need some type of framework to tie them together in our cyber society.
-
Top 5 password alternatives
Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords.
-
How to set up an SFTP server on Linux
These steps walk you through the process of setting up an SFTP server on Linux for the secure transfer of files for specialized file transfer-only users.
-
More than 99% of attacks in the past year relied on human error to gain access
Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint.
TechRepublic Premium
Premium Content
TechRepublic Premium is our exclusive technical research library. Browse and read from our entire directory of original IT research, expert analysis, ebooks, and policies. Sign up today

















