Security
Security | News, how-tos, features, reviews, and videos
Mobile management: Expert guide
InfoWorld.com has put together a free, 20-page "Mobile Management Deep Dive" PDF special report that explains the innate security capabilities of the key mobile platforms (BlackBerry, iOS, Android, Symbian, Windows Mobile, Windows...
Adobe fixes critical Flash Player flaws
The Computerworld story, "Adobe fixes critical Flash Player flaw" posted on Wednesday contained incorrect information regarding the type of PowerPC Macs that Adobe will no longer provide Flash support.
Security vendors push intrusion-detection, professional services
Established vendors and startups last week announced products and services for network intrusion-detection and outsourced security management.
Report: Google Ditches Windows Over Security Issues
Google employees are slamming Microsoft's Windows operating system, claiming security vulnerabilities in the OS left the company open to Chinese hackers in January 2010, a new report says. According to the Financial Times, Google will...
Developer finds major coding errors in Facebook, MySpace
Social-networking sites MySpace and Facebook have apparently fixed coding errors that could have allowed an attacker access to all of their users' data and photos.
REFRESH TEST STORY: Understanding the Windows Unified Update Platform
The platform that drives Windows Update, UUP enables client devices to find, download, install, and roll back Windows updates. Here’s how it works and how to use the UUP Dump website to create custom Windows images for enterprise...
Feds to Microsoft: Clean up your security act — or else
The US government, worried about the increasing role of rival nations in cyberattacks and cybercrime, looks poised to force tech companies to do more about security.
Why you should use Apple’s Rapid Security Response
A new Apple feature called Rapid Security Response is aimed at bolstering security for iPhone, iPad and Mac users. Here's what it does and why you should use it.
Jamf VP explains enterprise security threats — and how to mitigate them
Jamf has published its annual security trends report; I spoke with Michael Covington, the company's vice president of portfolio strategy to gain insights into what Jamf turned up.
Maybe one day every platform will be as secure as Apple
A glance at the Biden Administration’s recently updated National Cybersecurity Strategy document seems, at least on casual reading, to reflect some of the approaches to cybersecurity Apple already follows.
For Apple’s enterprise success, endpoint management is the new black
"Endpoint management and security has been the most popular security category by number of customers since August 2020," an Okta report explains
Microsoft Intune Suite consolidates endpoint management and protection
Intune Suite will streamline endpoint management with added features for controlled and secure access.
Apple’s MFi scheme for USB-C is a good thing
Apple may be about to make it harder to use lower cost USB-C cables with its devices, but there are very good reasons it should do so.
Software bugs that bug me – and how to swat them down
Sometimes when things go awry in Windows, the easiest fix is to undo the last thing you did. Here’s how to do some sleuthing to (hopefully) find and fix the problem.
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay
Jamf Threat Labs has spotted a family of Mac malware, XMRig, that spreads through pirated versions of Final Cut Pro, Photoshop and Logic Pro X.
EU parliamentary committee says 'no' to EU-US data privacy framework
Progress on ratifying the Trans-Atlantic Data Policy Framework hit a snag, as a parliamentary committee rejected a draft decision to adopt the pact, saying it did not comply with the EU's GDPR privacy regulations.
Three zero-days require urgent attention for Windows, Exchange
This month's Patch Tuesday update addresses 76 vulnerabilities affecting Windows, Exchange, Office, and Microsoft development tools — including three zero-day flaws already in the wild.
Security tool adoption jumps, Okta report shows
A report from identity and access management (IAM) vendor Okta says that zero trust and new types of security tooling are in increasingly widespread use, as businesses tackle a changing security landscape.