Industry News

Are open source foundations nonprofits? The IRS says no

Open Sources - Tue, 07/08/2014 - 06:00

Credit: Duncan Smith

read more

Categories: Open Sources

Governance for the GitHub generation

Open Sources - Mon, 06/30/2014 - 06:00

Credit: iStockphoto

read more

Categories: Open Sources

Red Hat, Joyent, and others break down licensing barriers

Open Sources - Mon, 06/23/2014 - 15:31

Credit: iStockphoto

Tech companies have been telling an important story with their actions over the last few weeks. What do these stories have in common?

read more

Categories: Open Sources

System Care AV - removal

virus Resources on TechRepublic - Tue, 06/11/2013 - 08:02
System Care AV - removalLooking for the best and easiest method of removal of the "System Care Antivirus". I appreciate any information anyone has to offer on removal of this virus.

Your Data under Siege: Defeating the Enemy of Complexity

virus Resources on TechRepublic - Mon, 06/10/2013 - 03:00
Complexity is to cybersecurity what kryptonite is to Superman. Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable? Download Kaspersky Lab’s new whitepaper, Your Data under Siege: Defeating the Enemy of Complexity, to...

DARPA's Plan X and the future of the U.S. cyber defense infrastructure

virus Resources on TechRepublic - Tue, 06/04/2013 - 08:30
Plan X sounds like a summer sci-fi movie, but it's actually one of DARPA's latest projects, aimed at improving the nation's defense of critical infrastructure targets.

The anatomy of a phishing operation

virus Resources on TechRepublic - Mon, 06/03/2013 - 10:04
There are far better things than being phished, like writing about how not to get phished. Michael P. Kassner reviews a research paper that provides amazing insight into a successful phishing operation.

NETGEAR ReadyNAS: Industry-first innovation and unrivalled ease-of-use...

virus Resources on TechRepublic - Fri, 05/24/2013 - 03:00
ReadyNAS, the latest in Network-attached storage (NAS) devices from NETGEAR, packs industry-first innovation and unrivalled ease-of-use into top-end storage. Unlimited snapshots, thin provisioning, cloud-managed replication and real-time anti-virus are just some of the features that allow you to do more with your business data than you ever thought you could afford.

Malware in the Google Play Store: Enemy inside the gates

virus Resources on TechRepublic - Wed, 05/22/2013 - 15:38
Google Play has experienced some recent malware infestations. Learn about the details and how to protect yourself and your users.

Cryptoviral Extortion: A virus based approach

virus Resources on TechRepublic - Sat, 05/18/2013 - 03:00
As the authors know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. But Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how modern cryptographic tools and paradigms can...

The Honey Chrome extension: An example of what's new and better

virus Resources on TechRepublic - Mon, 05/06/2013 - 14:06
A Chrome extension called Honey can automatically find coupon codes to apply during your online checkouts. Find out how it works and how it came to be.

Computer Virus: Their Problems & Major Attacks in Real Life

virus Resources on TechRepublic - Wed, 05/01/2013 - 03:00
Today's enterprise networks are distributed to different geographical locations and applications are more centrally located, information represents the most important asset. With the growing number of data communication services, channels and available software applications, data are processed in large quantities and in a more efficient manner. This technological enhancement offers new...

Network Security-Proposals

virus Resources on TechRepublic - Wed, 05/01/2013 - 03:00
The explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside...

Whitepaper: The Inevitable Extinction of PSTs

virus Resources on TechRepublic - Tue, 04/30/2013 - 03:00
Microsoft® Exchange administrators are responsible for the integrity, security, and availability of an organization's email platform. Some of the most common threats to mailboxes are viruses, spam, and hardware failures, but there is another, often overlooked culprit -PST files.This white paper discusses the problems that PSTs cause as well as a systematic approach for eliminating them.

Survey Report: Insights on Endpoint Security and Stealthy Threats

virus Resources on TechRepublic - Tue, 04/30/2013 - 03:00
This report captures key findings from a survey of 400 IT professionals, including 200 in the United States and 200 in the U.K., that can help you understand how your peers are managing endpoint security and protecting against stealthy threats, such as rootkit attacks.Use the benchmarking data in the report for your own IT security initiatives, including:* Gaining insight into the top...

Protect your privacy with these five applications

virus Resources on TechRepublic - Thu, 04/25/2013 - 13:55
There are a number of different utilities that you can use to mitigate risk and help protect your privacy.

On the Feasibility of Online Malware Detection with Performance Counters

virus Resources on TechRepublic - Thu, 04/25/2013 - 03:00
The proliferation of computers in any domain is followed by the proliferation of malware in that domain. Systems, including the latest mobile platforms, are laden with viruses, rootkits, spyware, adware and other classes of malware. Despite the existence of Anti-Virus software, malware threats persist and are growing as there exist a myriad of ways to subvert Anti-Virus (AV) software. In fact,...

Review: ZoneAlarm Free Antivirus + Firewall 2013

virus Resources on TechRepublic - Wed, 04/17/2013 - 15:03
ZoneAlarm looks to bolster options for consumers and businesses, with the inclusion of a free Antivirus and Firewall edition.

DropSmack: Using Dropbox to steal files and deliver malware

virus Resources on TechRepublic - Mon, 04/15/2013 - 10:46
Michael P. Kassner interviews a digital forensic scientist who uses Dropbox to compromise targeted networks -- something the bad guys probably figured out as well.

The best Mac antivirus applications

virus Resources on TechRepublic - Thu, 04/11/2013 - 08:30
Erik Eckel recommends two antivirus solutions for Mac protection.