- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- How to keep your smartphone (and its data) secure
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Web apps and point-of-sale were leading hacker targets in 2013, says Verizon
- Google introduces Chrome 'factory reset' pop-ups to tackle extensions hijacks
smartphones in pictures
BlackBerry today released an update to its BlackBerry Enterprise Service (BES) 10 software designed to address a "Heartbleed"-related OpenSSL vulnerability in the version of Apache Tomcat used within the BES BlackBerry Work Connect Notification Service. (A detailed breakdown of the vulnerability is available on NIST.gov.)
The iOSphere this past week wondered at the prospect of iPhone 6 with a Supercharged Siri, an all-knowing, all-doing software entity that will manage your iOS life for you. Eventually, probably in iOS 9, Siri will offer psychotherapy.
It took just four days for German researchers to trick the Samsung Galaxy S5's fingerprint scanner into accepting a mold of a fingerprint instead of a real finger.
Google is boosting Android security safeguards to better detect potentially harmful apps throughout their life cycle.
BlackBerry is promoting an upcoming end-to-end encrypted messaging service called BBM Protected for industries that need the highest levels of security.
Your Android phone not only enables you to do nearly everything online, but also allows you to carry your life in your pocket. Although having all that information in a single location and always on hand may be especially convenient, it makes for an appealing target to thieves and hackers. But you're not defenseless: You can take a number of steps and precautions to ensure that your stuff stays safe.
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
BlackBerry's fall means CIOs must quickly develop a new mobile strategy. The big three of enterprise mobility are familiar names -- Apple, Samsung and Microsoft. Who will win out?
Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the ADM Website.
Vague policies, rogue apps, zombie phones can doom even the best Bring Your Own Device intentions. But the good news is it's not too late to make game-changing adjustments.
In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.
Sign up now »
Automate business-continuity and disaster-recovery planning and enable crisis management in one solution.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.