Securing Mac computers means more than just protecting the data. Limiting the ways a user can gain access to a device--including bypassing the existing OS or resetting account passwords is easily enabled with a simple command.
A career as a cybersecurity specialist requires more than just technical skills. Cybersecurity professionals also tend to have specific personalities. Do you qualify?
In an effort to increase transparency and prevent fraud, blockchain may be the next platform for trading goods.
ATO attacks steal a person's credentials and use them to send emails from their account, according to a recent Barracuda Networks report.
Malicious login attempts from bots increased by by almost 2 billion from April to May 2018. Here's who is at risk.
Blockchain stands to revolutionize many industries, but many people are still unsure of how the distributed ledger technology underpinning Bitcoin works.
Phishing is the biggest threat facing SMBs, according to the 2018 Webroot SMB Pulse Report.
More than half (55%) of malware infected sites were running on their latest core versions when they were attacked, according to a recent SiteLock report.
The battery saver feature was turned on as an 'internal experiment,' which Google has since rolled back.
Another month where Android finds itself with a mixture of Critical and High vulnerabilities. Jack Wallen offers highlights.
Jack Wallen walks you activating and enabling Android Pie's new lockdown mode and shows why you should use it.
Those annoying spam calls are on the rise, but TechRepublic's Tom Merritt has 5 solutions
Annoying spam calls are on the rise, and here's how to block 'em, explains TechRepublic's Tom Merritt
A quarter of German manufacturing companies reported losing sensitive mobile phone data, according to a Bitkom survey.
North America is the region where C-Suite leaders are most likely to be blamed for a breach.
Less than a week after Chrome was updated to hide the "www" from users, Google have put the subdomain back into the address bar.
Malicious Microsoft Office attachments are more common than malicious batch scripts and PowerShell scripts, according to Cofense. Here's how to protect your business.
Read about the saga of Facebook's failures in ensuring privacy for user data, including how it relates to Cambridge Analytica, the GDPR, the Brexit campaign, and the 2016 US presidential election.
Jack Wallen activates and enables Android Pie's new lockdown mode.
BlackBerry Security Summit London: CEO John Chen details how the company wants to harness machine learning and AI.
Password inadequacy remains a top threat in internet security, according to a new report from WatchGuard Technologies.
Jake Dilemani, Senior Vice President Mercury Communication, explains how cyber-attacks targeting communication systems and critical infrastructure can alter the course of history.
Biometrics, from fingerprints to iris- and facial-recognition, are advancing, with behavioral biometrics quickly becoming the security access of choice, says BioCatch VP Frances Zelazny.