With at least two companies selling technology that can be used by law enforcement and government agencies to unlock iPhones, this would be a good time to safeguard your information with a stronger passcode. Here's how.
Stories by Lucas Mearian
Local and regional police departments and federal agencies are lining up to buy technology from two companies whose products can bypass iPhone security mechanisms.
Blockchain, with its encrypted and immutable record, will eventually be used create universal digital identities, filled with information that only we will control and that will link back to the issuing banks, governments or even employers.
Bitcoin and other cryptocurrency miners have created a dearth of mid-range and high-end GPU cards that are selling for twice as much as suggested retail. The reason: miners are setting up server farms with the cards.
With the release of Apple's iPhone X and its Face ID feature, facial recognition technology has become more mainstream – and it's already being piloted by some government agencies and commercial airlines as a friction-free security measure.
After integrating with VMware's Workspace ONE's UEM cloud portal last year, Google has now expanded the number of enterprise mobility management platforms IT managers can use to control Chrome OS devices.
Companies are expected to boost their deployment of augmented reality software and hardware this year as they bolster efforts to enable employee mobility.
California could join a growing number of states seeking to enact "Right to Repair" laws that let consumers take smartphones and other devices to third-party repair shops or fix them at home without voiding warranties.
Android smartphone and tablet owners tend to be slightly more loyal to their brand than do Apple iOS device users.
New research suggests that sandbox test environments for blockchain could help cement a partnership between governments hammering out new regulations and the businesses hoping to use the distributed ledger technology.
As mobile device use increases among U.S. government workers, IT and security officials are scrambling to better secure devices, leaving behind traditional anti-malware tools in favor of mobile threat detection and role-driven access rules.
As part of an ongoing regulatory clampdown, the US SEC has issued subpoenas and wants info from tech companies issuing cryptocurrencies in the form of ICOs.
HP has added Apple smartphones, tablets and laptops to its list of hardware it now supports under its managed service.
Microsoft plans to pilot a blockchain-based digital ID platform that would allow users to control access to sensitive online information via an encrypted data hub.
The growth in unmanaged devices owned by employees or contractors is driving adoption of stand-alone mobile application management (MAM) software and services, according to a new report.