The Pentagon's decision to grant Apple the security clearance required for iOS 6 devices to go head-to-head with BlackBerry 10 and certain Samsung Galaxy S4 devices on secure military networks could have with a cascading effect that spills over into the private sector.
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.
In an alarming 'post-PC' era alert, working group says criminal infrastructure created much faster than it was for PC fraud
PayPal CISO Michael Barrett took the keynote stage at Interop to announce the impending death of passwords and their replacement with more robust authentication protocols based on an open standard. Apple may lead the way with its next iPhone.
She's your mom. She's risen to every challenge, not the least of which was raising you to be the fine, upstanding PC enthusiast you are today.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do.
As 2012 draws to a close, Ericsson ConsumerLab has identified the hottest consumer trends for 2013 and beyond. For more than 15 years, ConsumerLab has conducted research into people's values, behavior and ways of using ICT products and services.
Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.
Sign up now »
The FireEye Email Malware Protection System (MPS) secures against spear phishing email attacks that bypass anti-spam and reputation-based technologies.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.