- German researchers hack Galaxy S5 fingerprint login
- Today's Approach to Security is Broken
- JP Morgan to invest £150 million on boosting cyber security
- Financial services firms to increase cyber security budgets this year, PwC claims
Apple in pictures
Whether it's the first time you've picked up an iPad or the seventeenth time you've pulled out your iPhone today, there are probably still some iOS 7 features and functionality that you're not familiar with. Don't sweat it: We're here to help. We've collected some of our favorite and most useful tips and compiled them here, just for you.
The kill switch application wireless carriers and device manufacturers plan to make available next year for new smartphones could benefit small businesses on a tight budget, an expert says.
The official calendar for Joshua Wright, a commissioner with the U.S. Federal Trade Commission, shows he has had many meetings with technology company lobbyists, but none with consumer advocates, even though consumer protection is a major part of the agency's mission.
Sometimes smaller stories slip through the cracks; this Thursday, we're here to catch them with a feature we call Reading List.
Apple on Tuesday patched the security vulnerability in Safari that was successfully exploited at last month's Pwn2Own hacking contest, where a team cracked the browser to win $65,000.
Update, update, update: Form that habit now, if you haven't already, to keep up with security fixes. The latest include the usual tweaks to fend off malicious attacks, and a fix to Java that should prevent it from disabling itself constantly. That would be nice.
You can use Apple's Disk Utility to convert a folder into an encrypted disk image--a protected archive that you unlock with a password. Such images are particularly helpful when you're working on confidential company documents away from the office or when your business card reads: International Person of Mystery. But the truth is that creating encrypted disk images with Disk Utility is cumbersome. Thankfully, with a simple Automator workflow, you can secure documents in an instant. It works like this:
When it comes to your security, the latest versions of Windows and OS X are comparable, but you still have a few key differences and settings to become familiar with.
Reader Evan Katz wonders just how safe the data on his Mac is. He writes:
If your computer is stolen or otherwise liberated from your possession, don't despair: If you've remembered to enable Find My Mac, you can track it, remotely lock it, and even send messages to your Mac's screen.
Apple has improved its security in recent years, but is it enough?
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring - and if one mobile operating system has an edge over another when it comes to securing enterprise applications and data.
It's the time of year when we make promises for the new year that are routinely broken before that year is a week old. And for this reason, far too many of us simply resolve to never make another resolution. (Because, after all, that's an easy one to keep.)
Apple's App Store, Google's Play store and other app stores are packed with apps that can compromise your security and privacy without you ever knowing anything bad happened. What's a mobile app user to do?
BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?
Sign up now »
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.