- Tutorial: How to fix app store errors in Windows 8
- How to fix the two-factor authentication log-in error in Gmail on Android
- 10 open source e-learning projects to watch
- How to fight back against CryptoLocker
security in pictures
Apple exposed iOS users to security threats by taking three weeks longer to patch the same vulnerabilities in the mobile OS that it previously fixed in Safari on OS X, a former Apple security engineer said.
By Lucian Constantin | 25 April, 2014 05:41
Computerworld offers a Tip of the Hat to Jon Brodkin of Ars Technica for an incisive look at how only a potential disaster could convince top tech execs to finally help fund the OpenSSL and other open-source projects.
By Mike Bucken | 25 April, 2014 02:42
A cybercriminal operation that combines phone-based social engineering attacks with spear phishing and malware to steal money from organizations has resurfaced this year, finding victims in French-speaking countries in particular.
By Lucian Constantin | 25 April, 2014 00:30
Reeling from the Heartbleed security fiasco, major IT vendors including Microsoft, IBM, Intel, Google and Cisco are backing a Linux Foundation initiative designed to boost open source projects considered critical to the industry.
By Juan Carlos Perez | 24 April, 2014 22:42
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Many reasons exist for why you might want or need to "security wipe" a BlackBerry, or completely erase all personal data stored on your handheld: You got a new smartphone and plan to retire the older device; you're trading in your existing BlackBerry for a new one from your wireless carrier; you and a friend are swapping devices; you loaded too many applications or media and just want to start over from scratch; etc.
By Al Sacco | 15 December, 2010 07:11
Today is the final Microsoft Patch Tuesday for 2010. It has been a busy year for Microsoft when it comes to security bulletins, and December is no exception as Microsoft closes out the year with a record 17 security bulletins. With only a week or so until many IT admins plan to kiss 2010 goodbye and break for the holidays, it is important to understand and prioritize the latest patches for quick implementation.
By Tony Bradley | 15 December, 2010 07:13
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe.
By Preston Gralla | 04 April, 2014 01:00
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
Whitepapers about security
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDeliverability SpecialistNSW
Meeting security-related compliance requirements is an increasingly complex job. Follow these best practices to easily manage compliance.
- Why Japanese watchmakers have no time for smartwatches
- Surveillance, ICANN transition dominate Brazil NETmundial meeting
- Pinterest puts its posts in the spotlight with 'Guided Search'
- Baidu's profit boosted by mobile ad revenue
- Exclusive: Google mulling Wi-Fi for cities with Google Fiber
- US wireless users may get to share military spectrum
- Apple, Samsung bicker over jury verdict form
- World Tech Update: On the road at the New York Auto Show
- Four growing European startups to keep an eye on
- Microsoft profit drops but devices, consumer products help results
- US tech spending to see 'solid, steady growth' this year and next, Forrester says
- Official urges state to adopt federal Obamacare site, rather than fix one Oracle built
- Google, Apple, Adobe and Intel agree to settle Silicon Valley hiring case
- Wearable device battery could last 10 years
- New iPad rumor rollup for week ending April 23