Lessons from a hack
David Gee relives the day he became the victim of a spear phishing attack.
David Gee relives the day he became the victim of a spear phishing attack.
At 1 pm Eastern today, Apple introduces its newest software updates to a group of 5,000 avid developers at its annual Worldwide Developers Conference. Very little is known, but much is speculated about what the company will unveil, especially given the promise of "new product categories" to be introduced in 2014.
Palo Alto Networks' annual threat analysis of customer network traffic shows that botnet-controlled malware that makes its way into enterprise networks almost always uses the User Datagram Protocol (UDP) to communicate, blending in with legitimate UDP-based applications such as video.
Thousands of Bell Canada field technicians this fall will begin doing their jobs of installing and testing telecom and media services connections with help from custom-designed smartphone apps rather than via their laptops. It's all part of what Bell Canada is calling its "One Device" mobile initiative, in essence, a mobility makeover.
A year ago, people were mostly talking about the potential of the Internet of Things (IoT) -- what companies and government entities might do in the future to take advantage of this widespread network of connected objects.
Microsoft may be prepping to ship a mini version of its Surface tablets within a month, based on an Amazon.com listing for a case custom made for the device.
As a dad of three youngsters, one of my favorite categories in the holiday gift guide is seeing what technology-related fun we can dig up and play with. Here our a bunch of our favorite toys and silly geeky things that will keep your kids (or the kid in you) entertained for weeks, months or even years.
Our annual holiday gift guide always ends up with devices and gadgets that we just can't fit into the other buckets. But rather than not consider them, we create a "miscellaneous" bucket. If you're an artist, creative type or are just looking for something to keep track of your keys, check out some of these gift ideas / suggestions:
Music drives a lot of what we get out of our technology devices - if you can't hear the music from your device, or share it with others, it's just a bunch of ones and zeros sitting on a magnetic hard drive.
In general giving someone the gift of a device that can recharge the battery on their smartphone or tablet might not be on the top of your list. After all, people are generally more excited opening the box on their new phone, tablet or music player than a small black box with power prongs attached to it.
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions