Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

9 ipad pro keyboard

Adobe fixes critical Flash Player flaws

The Computerworld story, "Adobe fixes critical Flash Player flaw" posted on Wednesday contained incorrect information regarding the type of PowerPC Macs that Adobe will no longer provide Flash support.


Developer finds major coding errors in Facebook, MySpace

Social-networking sites MySpace and Facebook have apparently fixed coding errors that could have allowed an attacker access to all of their users' data and photos.

WWDC teaser image

What is Managed Device Attestation on Apple platforms?

Announced at WWDC 2022, Managed Device Attestation protection shows that Apple embraces the need for endpoint security.

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

Android Privacy Feature

The best privacy and security apps for Android

Forget malware scanners or over-the-top security suites: These are the apps that'll actually improve your security and protect your privacy on Android.

open insecure padlock with circuitry and windows logo

Windows 11: Should you bypass the hardware block?

Strict hardware requirements block many machines from upgrading to Windows 11. There’s a way around that block, but should you use it? Here’s what to consider.

macbook pro 2016 with display

Jamf adds network and endpoint security tools for enterprise Macs

Jamf has unveiled a series of significant updates designed to improve Mac enterprise security, and touted additional security solutions.

Android Security Settings

12 Android settings that'll strengthen your security

Some of the most important Android settings are also the most buried — and they're absolutely worth your while to uncover and put into action.

thinkstock guy checking iphone email

Microsoft Defender for Endpoint brings remote deployment to iOS

Microsoft has taken another step toward making life considerably easier for enterprise admins seeking to secure fleets of remote iOS devices at the endpoint.

Android security

Android security checkup: 16 steps to a safer phone

Android security doesn't have to be a source of stress. These level-headed steps are all you need to keep the boogeyman at bay.

universal endpoint management uem sdecoret shutterstock

How to choose the right UEM platform

Unified Endpoint Management software lets IT manage all of an organization’s endpoint devices — smartphones, laptops, desktops, printers, IoT devices, and more — from a single management console. Here’s what to look for when shopping...

internet web browser https / url address bar

Chrome, Edge kick off faster release cadence; enterprises can skip versions

Users will now get updates for the two browsers every four weeks, though companies can opt for a slower cadence.

podcast image template 4
Podcast Today in Tech

Podcast: Windows 11 overview: Hardware requirements, security updates and upgrade confusion

Microsoft will launch Windows 11 on October 5, but not every PC will be eligible for an immediate upgrade. Rollout will last well into 2022 for machines that meet the necessary hardware requirements, and Windows 10 will be supported...

binary code, magnifying lens, skull and crossbones

Why enterprises must install the latest macOS software patch

The latest version of Apple's desktop OS, macOS Big Sur 11.3, protects Macs against a serious software vulnerability that places data at risk.

Tech Spotlight   >   Cybersecurity [CW]   >   A remote worker at her laptop.

Work-from-home security lessons from the pandemic

The unplanned worldwide experiment in remote work has been a trial by fire for security pros. Here’s how IT teams have protected work-from-home employees, and what needs to be done moving forward.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Cybersecurity in 2021: Stopping the madness

The challenges are greater than ever. But security pros have learned a lot – and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to protect Windows Remote Desktop deployments

Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.

security audit - risk assessment - network analysis

Microsoft 365 Advanced Audit: What you need to know

Microsoft's powerful new auditing options will help detect intrusions and see what was accessed...if you've paid for the right licenses.

Android Smart Lock Trusted Places

How to fix Android's Smart Lock Trusted Places feature

A 60-second workaround to make Android's location-based Smart Lock start working again.

Load More