Array
(
[last_tab] => 1
[mts_logo] => https://techsecuritydaily.com/wp-content/uploads/2016/11/tsd-logo-1.png
[mts_footer_logo] =>
[mts_favicon] =>
[mts_header_code] =>
[mts_copyrights] => Theme by MyThemeShop.
[mts_trending_articles] => 1
[mts_trending_articles_cat] => 18
[mts_featured_slider] => 1
[mts_featured_slider_cat] => Array
(
[0] => 16
)
[mts_featured_carousel] => 1
[mts_featured_carousel_cat] => 16
[mts_pagenavigation] => 1
[mts_color_scheme] => #38b7ee
[mts_layout] => cslayout
[mts_full_posts] => 0
[mts_bg_color] => #e7e5e6
[mts_bg_pattern_upload] =>
[mts_custom_css] =>
[mts_responsive] => 1
[mts_tags] => 0
[mts_related_posts] => 1
[mts_author_box] => 0
[mts_header_adcode] =>
[mts_posttopleft_adcode] => Submit original article and get paid. Find out More
[mts_posttop_adcode] =>
[mts_posttop_adcode_time] => 0
[mts_postend_adcode] =>
[mts_postend_adcode_time] => 0
)
Latest
News & Highlights
(Source: Networks Asia) This year’s Equifax breach was a reminder that open source software and components pose a giant risk to enterprise security despite their many benefits, especially when not properly maintained. Open
Read More
News & Highlights
(Source: Lifehacker Australia) The phony versions of Telegram, a popular messaging app with a focus on security, were recently spotted by cybersecurity firm Symantec. They both look like nearly perfect
Read More
News & Highlights
(Source: Christian Post) WhatsApp, a Facebook-owned messaging software, is one of the widely used communication apps with around a billion users worldwide. It introduced end-to-end encryption, which is also applied
Read More
News & Highlights
(Source: Security Intelligence) Security staff are spending too much time on tasks that can be better handled by software. As noted by ZDNet, IT decision-makers estimate that employees waste three hours per
Read More
News & Highlights
(Source: Engadget) There’s a good reason why security analysts get nervous about bundled third-party software: it can introduce vulnerabilities that the companies can’t control. And Microsoft, unfortunately, has learned that the hard
Read More
News & Highlights
(Source: The Register) John Wall, senior vice president of BlackBerry QNX said: “Baidu has made tremendous strides in Artificial Intelligence and deep learning. These advancements paired with their high-definition
Read More
News & Highlights
(Source: The Register) It allows anyone with a bit of software to boot people off a Wi-Fi network with a DEAUTH attack. And it’s not particularly secure. The Wi-Fi Alliance – an
Read More
News & Highlights
(Source: Charlotte Business Journal) Temprano Techvestors owner Luke Walling says the Waytek Software deal doesn’t end the company’s pursuit of security software. NSG “plans to add a few more carefully chosen lines”
Read More
News & Highlights
(Source: New York Times) Security software runs closest to the bare metal of a computer, with privileged access to nearly every program, application, web browser, email and file. There’s good reason
Read More
News & Highlights
(Source: The Guardian) The most important utility missing from Windows 10 and many clean-up/tune-up suites is a program that checks whether software is up to date. Nowadays, most security holes
Read More