Flash Player 11 should fix plenty of security holes, just like Adobe Reader X did a year ago. But Adobe's products will continue to be a target as long as people insist on running obsolete software.
Stilgherrian |
04 Oct |
Read more
Security researchers say they've uncovered a flaw in several smartphone models produced by HTC that gives any application that has Internet access the keys to a trove of information on the phone, including e-mail addresses, GPS locations, phone numbers, and text message data.
John P. Mello Jr. |
03 Oct |
Read more
Look for double the mobile exploits this year vs. 2010 and particularly watch out for mobile applications that are really malware, says IBM's X-Force security research team.
Tim Greene |
30 Sep |
Read more
IT professionals should stop mocking their users for doing seemingly stupid things like opening phishing emails, according to IBM. These un-patchable people could turn out to be the canary that flags the next Advanced Persistent Threat attack.
Liam Tung |
30 Sep |
Read more
Amazon's new Silk browser has raised some eyebrows among privacy and security experts.
Gregg Keizer |
30 Sep |
Read more
A Russian security company has upgraded a phone-password cracking suite with the ability to figure out the master device password for Research in Motion's BlackBerry devices.
Jeremy Kirk |
29 Sep |
Read more
Automotive and industrial products company Rema Tip Top Australia has begun the process of a tablet review following the implementation of a new firewall system.
Hamish Barwick |
26 Sep |
Read more
If your company is like most, you've been wrestling carefully with the security protections necessary to manage demand for bring-your-own (BYO) computing policies. You may even work at Suncorp or one of the other organisations, that have embraced the idea as a way to reduce IT costs and boost employee satisfaction.
David Braue |
29 Sep |
Read more
Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.
Elisabeth Horwitt |
29 Sep |
Read more
In the last 18-months, the mobile computing landscape has changed completely. People are bringing their own computers to the office and carrying smartphones and tablet devices that are as powerful as desktop computers were only a short while ago. Here’s how to make sure these devices don’t compromise your organisation.
Matt Rodgers |
26 Sep |
Read more
Microsoft has pulled off its third technical and legal botnet takedown, this time aimed at the Kelihos botnet and a domain responsible for the recent spate of MacDefender malware attacks on Mac users.
Liam Tung |
28 Sep |
Read more
BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.
John Cox |
28 Sep |
Read more
BoxTone, an enterprise mobility management software provider, today announced new enhancements to its Enterprise Mobility Management (EMM) platform that are designed to help CIOs, CISOs and other IT managers meet security and compliance regulations while managing large numbers of employee- and corporate-owned mobile devices.
Al Sacco |
27 Sep |
Read more
Despite widespread security concerns by smartphone users, 82 per cent do not have any security products installed, a survey by research group NPD has found.
Liam Tung |
26 Sep |
Read more
Facebook's new Timeline will make it even easier for criminals and others to mine the social network for personal information they can use to launch malicious attacks and steal passwords, a researcher said today.
Gregg Keizer |
24 Sep |
Read more
There's a new report out highlighting a huge spike in threats against Google's Android platform. It's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.
Bill Snyder |
22 Sep |
Read more
Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic <a href="http://www.pcworld.com/businesscenter/article/229145/malware_spikes_spam_plummets_says_report.html">rise in mobile security threats</a>, McAfee has developed <a href="http://www.mcafee.com/us/products/enterprise-mobility-management.aspx">Enterprise Mobility Management</a>.
Tony Bradley |
21 Sep |
Read more
Former White House cybersecurity adviser Richard Clarke, author of the book Cyber War, served 19 years in the Pentagon, intelligence community and State Department.
Ellen Messmer |
20 Sep |
Read more
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.
Eric Geier |
19 Sep |
Read more
The Child Exploitation and Online Protection Centre (CEOP) and its parent organisation the Serious Organised Crime Agency (SOCA), have made a commitment to improving the security of its websites.
Anh Nguyen |
17 Sep |
Read more