U.S. commercial drone industry struggles to take off

The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.

By Jaikumar Vijayan | 18 April, 2014 21:36

Tags: Gov't Legislation/Regulation, security, Emerging Technologies, regulation, hardware systems, government, privacy

7 all-in-one security suites: Anti-malware for all your devices

Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe.

By Preston Gralla | 04 April, 2014 01:00

Tags: kaspersky labs, security

Ad tracking: Is anything being done?

Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.

By Robert L. Mitchell | 02 April, 2014 22:19

Tags: data security, security, data protection, privacy

Microsoft returns to scare tactic well in dump-XP campaign

Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.

By Gregg Keizer | 26 March, 2014 16:06

Tags: Microsoft, Windows, software, operating systems, Malware and Vulnerabilities

Major companies, like Target, often fail to act on malware alerts

Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.

By Jaikumar Vijayan | 14 March, 2014 10:27

Tags: Target, Cybercrime and Hacking, security, Malware and Vulnerabilities

A clear-eyed guide to Mac OS X's actual security risks

Apple has improved its security in recent years, but is it enough?

By Bob Violino | 10 March, 2014 11:04

Tags: applications, Endpoint Protection, macbooks, Mac OS X, CIO, operating systems, antivirus, Gartner, Apple, computer hardware, Desktop Macs, security, anti-virus, encryption, software

Trust issue looms large for tech companies capitalizing on personal data

As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.

By Marc Ferranti | 06 March, 2014 22:06

Tags: Internet-based applications and services, ovum, smartphones, internet, deutsche telekom, Facebook, privacy, search engines, alcatel-lucent, consumer electronics, jasper wireless, security

CIO not the only one to blame for Target breach

That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.

By Jaikumar Vijayan | 05 March, 2014 21:27

Tags: data security, retail, security, Networking, data protection, CIO, industry verticals, management, Target

The rise of security-as-a-service in Australia

When you don’t have the funds for a CSO or IT security manager, it can be tough to keep your business protected. This has led to the emergence of the 'other SaaS' — security-as-a-service — with vendors and managed security providers (MSPs) offering cloud-based threat management.

By Hamish Barwick | 04 March, 2014 12:01

Tags: security, Cloud, cloud security, security as a service

Bitcoin malware count soars as cryptocurrency value climbs

As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.

By Gregg Keizer | 28 February, 2014 20:36

Tags: Dell, e-commerce, Dell SecureWorks, internet, e-business, Malware and Vulnerabilities

Huge turnout at RSA shows hackers are winning

In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week.

By Jaikumar Vijayan | 26 February, 2014 12:41

Tags: Cybercrime and Hacking, data security, security, data protection

5 issues that could hamper EMV smartcard adoption in the U.S.

Migrating U.S. payment systems to the Europay MasterCard Visa (EMV) smartcard standard could take significantly longer than envisioned and offer fewer security benefits than what's being touted by proponents of the technology.

By Jaikumar Vijayan | 11 February, 2014 12:13

Tags: Target, data security, visa, security, endpoint security, data protection

The Open Source Rookies of the Year Awards

, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the

By Black Duck | 28 January, 2014 14:08

Tags: application development, Configuration / maintenance, applications, Networking, hardware systems, Server Provisioning, internet, cloud computing, Data Center, internet privacy, virtualization, black duck, mobile technology, SDN, security, mobile security, software, open source software

After Target, Neiman Marcus breaches, does PCI compliance mean anything?

The recent data breaches at Target and Neiman Marcus have once again shown that compliance with the Payment Card Industry Data Security Standard (PCI DSS) is no guarantee against an intrusion.

By Jaikumar Vijayan | 24 January, 2014 21:29

Tags: data security, retail, security, endpoint security, data protection, CIO, industry verticals, Neiman Marcus, Target

Mac flashback: Bill Gates on the business impact of the Macintosh (3/2/1987)

Microsoft chairman praises Macintosh but never sees corporate buyers being a strong point for Apple

By InfoWorld staff | 24 January, 2014 11:06

Tags: borland, Apple, Desktop Macs, computer hardware, Adobe Systems, Microsoft, software, Mac OS X, operating systems

Obama in awkward spot after privacy board calls NSA snooping illegal

A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.

By Jaikumar Vijayan | 23 January, 2014 19:45

Tags: Government IT, National Security Agency, security, nsa, privacy

Perspective: Payment system security needs less talk, more action

Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.

By Jaikumar Vijayan | 23 January, 2014 16:05

Tags: Target, Cybercrime and Hacking, security, privacy

Read this before you buy another hard drive

It's rare that a company would release internal data on drive failure rates -- even more so when that company, Backblaze, earns its living storing consumer data in the cloud. That makes the hard drive data released this week even more valuable.

By Lucas Mearian | 22 January, 2014 21:11

Tags: Data storage, storage, storage hardware, hitachi, toshiba, western digital

Location-based services: Controversy at every level

Your smartphone can be a beacon telling the world where you are, with increasing precision. Is that good commerce or bad privacy, or maybe a bit of both?

By Lamont Wood | 21 January, 2014 11:57

Tags: Shopkick, applications, security, software, brother, mobile apps

Breach goes from bad to worse for Target and its customers

Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.

By Jaikumar Vijayan | 10 January, 2014 17:13

Tags: Target, Cybercrime and Hacking, security, Malware and Vulnerabilities

Top Whitepapers

Twitter Feed

Featured Whitepapers