Security

Security | News, how-tos, features, reviews, and videos

9 ipad pro keyboard

Mobile management: Expert guide

InfoWorld.com has put together a free, 20-page "Mobile Management Deep Dive" PDF special report that explains the innate security capabilities of the key mobile platforms (BlackBerry, iOS, Android, Symbian, Windows Mobile, Windows...

Adobe fixes critical Flash Player flaws

The Computerworld story, "Adobe fixes critical Flash Player flaw" posted on Wednesday contained incorrect information regarding the type of PowerPC Macs that Adobe will no longer provide Flash support.

Security vendors push intrusion-detection, professional services

Established vendors and startups last week announced products and services for network intrusion-detection and outsourced security management.

Report: Google Ditches Windows Over Security Issues

Google employees are slamming Microsoft's Windows operating system, claiming security vulnerabilities in the OS left the company open to Chinese hackers in January 2010, a new report says. According to the Financial Times, Google will...

Developer finds major coding errors in Facebook, MySpace

Social-networking sites MySpace and Facebook have apparently fixed coding errors that could have allowed an attacker access to all of their users' data and photos.

speed up fast quick 5

REFRESH TEST STORY: Understanding the Windows Unified Update Platform

The platform that drives Windows Update, UUP enables client devices to find, download, install, and roll back Windows updates. Here’s how it works and how to use the UUP Dump website to create custom Windows images for enterprise...

Microsoft Cloud App Security

Feds to Microsoft: Clean up your security act — or else

The US government, worried about the increasing role of rival nations in cyberattacks and cybercrime, looks poised to force tech companies to do more about security.

screen shot 2022 09 29 at 12.32.36 pm

Why you should use Apple’s Rapid Security Response

A new Apple feature called Rapid Security Response is aimed at bolstering security for iPhone, iPad and Mac users. Here's what it does and why you should use it.

bucket leaks breach hacked cybersecurity

Jamf VP explains enterprise security threats — and how to mitigate them

Jamf has published its annual security trends report; I spoke with Michael Covington, the company's vice president of portfolio strategy to gain insights into what Jamf turned up.

iphone 12 face id

Maybe one day every platform will be as secure as Apple

A glance at the Biden Administration’s recently updated National Cybersecurity Strategy document seems, at least on casual reading, to reflect some of the approaches to cybersecurity Apple already follows.

Apple Business Essentials

For Apple’s enterprise success, endpoint management is the new black

"Endpoint management and security has been the most popular security category by number of customers since August 2020," an Okta report explains

Microsoft announcement/update/news/tips

Microsoft Intune Suite consolidates endpoint management and protection

Intune Suite will streamline endpoint management with added features for controlled and secure access.

iPhone 15 USB-C port leaked pic

Apple’s MFi scheme for USB-C is a good thing

Apple may be about to make it harder to use lower cost USB-C cables with its devices, but there are very good reasons it should do so.

An exclamation-mark alert in a field of abstract technology.

Software bugs that bug me – and how to swat them down

Sometimes when things go awry in Windows, the easiest fix is to undo the last thing you did. Here’s how to do some sleuthing to (hopefully) find and fix the problem.

5 cryptography and data protection

Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay

Jamf Threat Labs has spotted a family of Mac malware, XMRig, that spreads through pirated versions of Final Cut Pro, Photoshop and Logic Pro X.

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

EU parliamentary committee says 'no' to EU-US data privacy framework

Progress on ratifying the Trans-Atlantic Data Policy Framework hit a snag, as a parliamentary committee rejected a draft decision to adopt the pact, saying it did not comply with the EU's GDPR privacy regulations.

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Three zero-days require urgent attention for Windows, Exchange

This month's Patch Tuesday update addresses 76 vulnerabilities affecting Windows, Exchange, Office, and Microsoft development tools — including three zero-day flaws already in the wild.

cso 1200x800 photowhysecuritybigdeal

Security tool adoption jumps, Okta report shows

A report from identity and access management (IAM) vendor Okta says that zero trust and new types of security tooling are in increasingly widespread use, as businesses tackle a changing security landscape.

Load More