Evan Schuman

Contributing Columnist

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Expect to see more online data scraping, thanks to a misinterpreted court ruling

Expect to see more online data scraping, thanks to a misinterpreted court ruling

In a case involving LinkedIn, a US appellate court has come to an obvious conclusion: scraping publicly-visible online data and content doesn't violate The Computer Fraud and Abuse Act. What does it mean? That's where things get...

Think the video call mute button keeps you safe? Think again

Think the video call mute button keeps you safe? Think again

Have you recently been on a video call, muted and then said something nasty about a client — or maybe even the boss? Were you confident the mute button was protecting your secret? You shouldn't have been.

Apple quietly stops meaningful auto-updates in iOS

Apple quietly stops meaningful auto-updates in iOS

Craig Federighi, Apple’s senior vice president of software engineering, acknowledged Apple has dramatically slowed down auto updates — by as much as a month.

The Russian cyberattack threat might force a new IT stance

The Russian cyberattack threat might force a new IT stance

With the threat of Russian cyberattacks still with us, companies need to be on a war footing when it comes to security.

When should the data breach clock start?

When should the data breach clock start?

Time is of the essence when a data breach occurs. The tricky part is figuring out exactly when a company first knows about a breach, and how long it has before making it public.

CVS app glitch makes — then cancels — vaccine appointments. And it gets worse.

CVS app glitch makes — then cancels — vaccine appointments. And it gets worse.

CVS Pharmacy has a widely used app and site to schedule various vaccinations, including for COVID-19. The problem? It has a glitch that allows customers to schedule appointments that are then cancelled without explanation.

Behavioral Analytics is getting trickier

Behavioral Analytics is getting trickier

One of the best authentication methods today relies on behavioral analytics, especially when it’s used as part of continuous authentication. But it is getting a bit trickier to do so reliably.

Signing up with a cloud provider? Don't forget to set an exit plan

Signing up with a cloud provider? Don't forget to set an exit plan

It’s not simply about getting easy permission to go when it's time to part ways; it’s about IT making sure any decisions don’t complicate that eventual departure.

Rackspace is now the roach motel of cloud platforms

Rackspace is now the roach motel of cloud platforms

Ever since its layoffs last summer and a plunge in quality, Rackspace lets customers in — but won’t let them out. A cautionary tale of a business that had to fight like heck to escape.

Google finds a nation-state level of attacks on iPhone

Google finds a nation-state level of attacks on iPhone

Much of mobile security advice these days is for users to be careful, not click on suspicious links nor open suspicious emails or attachments. But the growing popularity of no-click attacks sidesteps these defenses — and Google has...

Apple is sneaking around its own privacy policy — and will regret it

Apple is sneaking around its own privacy policy — and will regret it

Apple has a complicated relationship with privacy. It loves to tout its efforts, especially as a differentiator with Google. But actually delivering privacy? That’s a different story.

When biometrics can be outsmarted this way, we need to talk

When biometrics can be outsmarted this way, we need to talk

It’s a sad fact of mobile authentication: the industry tends to initially support the least effective and secure options. Take the recent case of the sleeping woman in China, for instance.

How often will your IT team check the iOS App Privacy Report?

How often will your IT team check the iOS App Privacy Report?

Apple is going to be extending its iOS app privacy report deeper into the operating system; will your IT admins be checking to see what it shows?

Latest Android security hole shows why IT should consider a mobile app allow list

Latest Android security hole shows why IT should consider a mobile app allow list

The mobile app security headaches continue. This time it's spyware found by mobile security firm Zimperium that not only steals data, but can silently control mic and camera — and secretly delete security apps. Fun times.

Store your corporate card on an iPhone? Uh-oh

Store your corporate card on an iPhone? Uh-oh

Apple, Google, and especially Visa this month have given us yet another example of how security and convenience are at odds in the mobile world. Convenience seems to have won out.

Google now tells criminals when Chrome users are 'idle.' What could go wrong?

Google now tells criminals when Chrome users are 'idle.' What could go wrong?

Another day, another revelation that mobile vendors might not always have users’ needs in mind, but they sure are helpful to cyberthieves.

How one coding error turned AirTags into perfect malware distributors

How one coding error turned AirTags into perfect malware distributors

A security researcher found that an open area for typing in a phone number has unintentionally turned AirTags into God’s gift to malware criminals.

Apple’s latest right-to-repair trick is delightfully evil

Apple’s latest right-to-repair trick is delightfully evil

I’ve always been impressed by how clever Apple can get when trying to protect its repair revenue. A new report from MacRumors doesn’t disappoint.

On app tracking, both Android and iOS have to do better

On app tracking, both Android and iOS have to do better

While Google has announced plans to reset permissions for older, rarely used Android apps, Apple’s app-tracking-transparency efforts in iOS have fallen short of the company’s grand vision.

Apple's anti-porn overreach — good intent, bad execution

Apple's anti-porn overreach — good intent, bad execution

Apple has unveiled plans to use its extensive powers to fight child pornography. Even though it has good intentions, the company's actual plan has given people dozens of reasons to oppose the move.

Load More