Quantcast
Channel: InfoWorld Tim Greene
Browsing all 79 articles
Browse latest View live

Microsoft verging on single OS across all devices

Microsoft seems on the brink of announcing a major enhancement to its operating system lines, namely merging them into a single OS that could bring big benefits for corporate users.The next version of...

View Article



Image may be NSFW.
Clik here to view.

Black Hat 2014: How to crack just about everything

How to crack just about everything As the world’s best security experts prepare to descend on Black Hat USA 2014, they must be rubbing their hands in anticipation of colleague’s upcoming revelations...

View Article

Ray Ozzie's Talko app stores calls in cloud, lets you search them

Ray Ozzie -- the father of Lotus Notes -- has launched Talko, a smartphone app that records group phone calls, stores them, and makes them searchable so group members can go back and listen to key...

View Article

Say goodbye to Microsoft Lync, hello to Skype for Business

Microsoft is upgrading its Lync unified communication platform to look and feel more like the familiar consumer version of Skype and changing its name to Skype for Business.By the middle of next year...

View Article

Gartner: Makers of things for Internet of things undervalue security

As the Internet of things develops, most vendors that are making these things don't make security their top priority, allowing business considerations to take precedent, according to a Gartner...

View Article


10 security startups to watch in 2015

A wealth of young security companies is trying to capitalize on businesses moving toward security platforms that help them respond more quickly when they suffer successful cyber attacks in hopes of...

View Article

Windows 10 embraces iris scans, facial recognition

Microsoft is embracing biometric login with a new feature of Windows 10 that can recognize faces, fingerprints, and irises for authentication it claims is more secure than passwords.Windows Hello can...

View Article

Schneier on ‘really bad’ IoT security: ‘It’s going to come crashing down’

Security expert Bruce Schneier has looked at and written about difficulties the Internet of Things presents -- such as the fact that the "things" are by and large insecure and enable unwanted...

View Article


RSA chief to security pros: Stop addressing the wrong problems

IT pros need to stop using old frameworks for addressing security and deal with today's reality because the old view of security is no longer useful, attendees at the RSA Conference 2015 in Las Vegas...

View Article


Startup touts safe sharing of Office 365 documents

Startup Vera promises to secure Microsoft Office 365 documents no matter where they go using policies set by the businesses that create them.The company lets users restrict access to individual...

View Article

7 things to do when your business is hacked

The first thing an IT security executive should do after the corporate network has been breached is fall back on the incident response plan that was put in place well before attackers got through the...

View Article

IBM finds another Android phone bug

IBM security researchers have found a way to exploit an Android flaw that puts more than 55 percent of Android phones at risk of being taken over by persistent attackers.By exploiting a weakness it...

View Article

10 more security startups to watch

The emergence of cyber security startups has continued unabated as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing and innovative attackers.The expertise...

View Article


Image may be NSFW.
Clik here to view.

Cisco: Flash exploits are soaring

Cisco is reporting that successful exploits of Flash vulnerabilities are soaring, partly because they are rapidly being incorporated in kits that take advantage of the flaws as well as because...

View Article

Why corporate security pros should care about the Ashley Madison breach

Corporate security executives should have a professional interest in the Ashley Madison breach because publicly posted data about its customers represents a fertile field for spear phishers trying to...

View Article


Obama advisors: Encryption backdoors would hurt cyber security, Net...

Making encryption backdoors available to law enforcement would be bad for cyber security in general and hurt vendors that make encryption gear, a presidential advisory group says. While the FBI argues...

View Article

China reportedly tries to hack U.S. businesses the day after agreeing not to

Chinese hackers have gone after seven U.S. tech and pharmaceutical companies since the presidents of both countries agreed not to knowingly carry out corporate espionage, according to security firm...

View Article


Crypto researchers: Time to use something better than 1,024-bit encryption

It's actually possible for entities with vast computing resources -- such as the NSA and major national governments -- to compromise commonly used Diffie-Hellman key exchange groups, so it's time for...

View Article

Dell computers shipping with potentially dangerous root certificate authority

At least some Dell laptops are shipping with a trusted root certificate authority pre-installed, something that those who discovered the CA are comparing to the Superfish adware installed on Lenovo...

View Article

The biggest data breaches of 2015

Big data breaches made big news in 2015 as measured by a variety of criteria that range from the number of records compromised to the types of data stolen to the potential threat to specific groups...

View Article
Browsing all 79 articles
Browse latest View live


Latest Images