freemium - News, Features, and Slideshows
With cybercrime hitting more than 500 million victims globally and costing $100 billion annually, it's clear that security breaches are a problem very far from being solved. One particularly dangerous threat that doesn't seem to be getting its fair share of attention is zero-day attacks.
By Dirk A. D. Smith | 19 August, 2013 12:00
As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix of corporate and personal access to data on the devices.
By John S. Webster | 17 June, 2013 13:47
According to the IT industry trade association CompTIA, "over 80% of companies now claim to use some form of cloud solution, whether that be virtual machines that can be spun up on demand or applications that can be easily procured and put into use."
By James Careless | 14 June, 2013 14:58
Bringing mobility to the enterprise is like wrestling with an octopus. Here's how Electronic Arts, Case Western University and Needham Bank are taming the beast.
By Howard Baldwin | 12 September, 2013 14:37
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- At Google I/O, no huge surprises but a honing of critical products
- The NSA reportedly tried -- but failed -- to use a Stuxnet variant against North Korea
- Google to Cardboard developers: Keep it short and simple, and watch out for nausea
- Italy's architectural elite moves to rub out crowdsourcing design site
- Apple's tech support thrashes competition, whether in-store or over the phone
- New iOS tools help Android developers -- and Google
- Ericcson touts 5G mobile speeds
- Silk Road mastermind Ulbricht sentenced
- Google I/O 2015 in photos
- Intel works to end "lost" data center devices
- Microsoft throws open the doors for Cloud Foundry on Azure
- Don't blame free Windows 10 for PC business ills
- Google and Levi's team up on smart clothes
- Google bets that smart fabrics, gesture interfaces will replace fiddling on a tiny wearable touchscreen
- New NSA phone dragnet proposals blasted as flawed