Microsoft issued a security advisory this week with details of a zero day vulnerability that affects every supported version of the Windows operating system with the exception of Windows Server 2003. The flaw is very similar to the OLE vulnerability patched earlier this month, which was linked to the Sandworm cyber espionage campaign.
Many organisations have embraced the concept of bring your own device (BYOD), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure.
The retail data-breach epidemic highlighted by Target now has other famous victims, including UPS, Home Depot, and Dairy Queen. If you've used a credit card sometime in the past year or two, there's a very good chance your information has been compromised or exposed by at least one of these data breaches. If you use Apple's new Apple Pay system, though, such worries just might be behind you.
If you've ever watched a horror movie, you know the trope where the hero seemingly kills the monster, but as soon as he turns his back to walk away the monster regains consciousness and attacks again with renewed vigor. According to the latest report from F-Secure, that's the sort of scenario we might be looking at with the Gameover Zeus botnet.
In an ideal world, a tablet would be an extension of the PC - a device that is more portable, yet still enables users to continue work done while on the go. Tablets like the iPad and Samsung Galaxy Tab do work in that capacity to an extent, but not seamlessly. Citrix is changing things, though, with the launch of Citrix ShareConnect, which it calls a remote access innovation that extends the promise of mobile workspaces on any device.
There are a number of smaller Windows tablets hitting the shelves now from Microsoft OEM partners and more on the horizon. At face value it seems like a late attempt by the Windows ecosystem to get in on the mobile device game. The reality, though, is that Microsoft can still capture a respectable--possibly dominant--stake of the tablet market.
Apple is reportedly planning to launch a 12.9-inch version of the iconic iPad tablet sometime in early 2015. A larger iPad could be a more effective tool for mobile business users, but only if Apple also addresses a few other issues.
Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don't miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new consumer survey from Kaspersky Labs, I am not alone.
Most businesses have embraced mobile technologies, but many are still on the low end of the mobile maturity curve. Good Technology has published its second-quarter Mobility Index Report, and it reveals some interesting trends regarding the mobile platforms and apps businesses are deploying.
Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised--giving attackers a simple way to access your information.
Don't let the word "virtual" in virtual servers fool you. You're the only one who knows it's virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey from Kaspersky Labs found that many IT professionals understand that securing virtual environments is important, but don't fully understand the threats or how to properly defend against them.
As much of the workforce in the United States coasts through the rest of the day looking forward to an extended weekend to grill hot dogs and drink beer--I mean, celebrate the nation's independence--Microsoft released its advance notification for next week's Patch Tuesday. The six security bulletins include two ranked Critical, three Important, and one listed merely as Moderate.
The Internet-of-Things is a thing. If you haven't heard about it yet, get ready because we're in the early stages of an explosion of technology that will connect, monitor, and in some cases share almost every aspect of our lives. Fortinet conducted a survey of consumers to find out what people think about the security and privacy concerns of the Internet-of-Things.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
Copyright 2014 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.