Pages

Thursday, May 20, 2021

Ransomware attackers are using triple extortion tactics

Internet Explorer: Microsoft announces the official end of IE; Zoom rolls out all-in-one Events platform
Subscription | Read Online | Twitter Facebook LinkedIn

Top Story of the Day

Ransomware attackers are using triple extortion tactics

Attackers are not only demanding ransom from organizations, but also threatening their customers, users and other third parties.

Additional resources

Microsoft announces the official end of Internet Explorer

Microsoft officially puts the kibosh on Windows 10X

Tech hubs see residential rental rebound, but how long will pricing last?

Freelancers in the US earned $234 billion in 2020

Ransomware attacks are not a matter of if, but when

How the COVID-19 pandemic made e-commerce boom

More than 50% of office pros spend more time searching for files than on work

Qualcomm announces new mobile platform and reference designs to speed up adoption of 5G

Zoom rolls out all-in-one Events platform

How to protect your organization and users against malicious emails

Cloud collaboration software are the new tools of choice for cybercriminals

Rubrik announces security upgrades aimed at alleviating the impact of ransomware attacks

Biden's executive order calls for greater open source security but not how to achieve it

Expert: Sharing intelligence on threats helps everyone fight cyberattacks

Get a handle on building WebAssembly microservices with this free Linux Foundation course

The global chip shortage isn't going to end soon, says Forrester research director

NFTs are cool, but they're a hot target for hackers: How to keep them safe

Will Android ever have a perfect phone?

1Password: How to install the password manager on Linux

How to add a timestamp to an Excel record

How to use SSH keys for passwordless access to hosts

How to add OpenProject integration into Nextcloud

Google Assistant: A cheat sheet

Featured multimedia

Security incident response policy

The Security Incident Response Policy from TechRepublic Premium describes the organization’s process for minimizing and mitigating the results of an information technology security-related incident.

Featured survey

What are the benefits to using low- or no-code platforms? Will low-code and no-code platforms result in fewer jobs for developers? Why or why not? Let us know by taking this quick survey.

A special feature from ZDNet and TechRepublic

Analytics: Turning data science into business strategy

Today's most successful companies know how to turn data into actionable business insights that drive digital transformation. In this special feature, we examine how advances in AI, visualization and cloud technology are shaping modern data analytics, and how businesses are addressing data governance and a potential data science skills gap.

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

Unsubscribe | FAQ | Terms of Use | Privacy Policy

© 2021 ZDNet, A Red Ventures company. All rights reserved.

ZDNet

235 Second Street

San Francisco, CA 94105

U.S.A.

No comments:

Post a Comment