It's not news that mobility is one of the major driving forces in IT today. Smartphones and tablets continue to supplant traditional PCs as primary computing devices, as people are getting more done from wherever they happen to be. A new study from Aruba Networks found that the demand for mobile productivity also puts significant stress on IT personnel and budgets.
Stories by Tony Bradley
The 2014 World Cup tournament has kicked off in Brazil. Soccer (or football anywhere outside of the United States) is the most popular sport in the world, and billions of people will be following the matches closely. While you're busy figuring out how to stream games to your work PC while appearing to be busy with an Excel spreadsheet, you should be aware that World Cup will also be a feeding frenzy of malware and phishing attacks.
When it rains it pours for eBay. Less than a week after the popular website revealed it was the victim of a massive data breach and directed users to change their passwords, researchers have discovered that it is vulnerable to serious flaws that could allow an attacker to access user accounts. Individuals need to know how to guard against falling victim to these security issues, and other businesses need to learn from eBay's mistakes and do a better job of protecting resources on the Web.
If you're one of the two out of three Windows users who also own Apple products, you may not realize you can use the traditionally adversarial platforms to get a productivity edge. Microsoft made waves when it launched Office Mobile for iPhone and the Office for iPad apps, but those were just the biggest steps in a strategy the company has been building for awhile. As a result, there are a slew of iPhone apps to help those who depend on Microsoft tools to get things done. Here are the 10 most essential.
You've probably heard by now that eBay is the latest victim of a massive data breach. The popular online auction site has asked users to reset their passwords as a precautionary measure, but the data that matters most is already compromised, and there is nothing you can do to "reset" it.
Security researchers have been stressing the dramatic rise in mobile malware for a few years now--which naturally leads to more users downloading and using some sort of mobile antimalware app. But now even malware protection has become a risk: last month the popular Virus Shield Android app was outed as fraud, and this week Kaspersky announced the discovery of a pair of fake apps using its name in the Google and Windows Phone app stores.
Once upon a time one of the primary handicaps of iOS devices was the fact that you had to physically connect it to a Windows or Mac PC with a USB sync cable to back it up using iTunes. With iOS 5 Apple introduced iCloud, essentially allowing users to cut the cord. But these iOS backup methods were not created equal, and if you don't choose carefully you could be risking significant data loss. To ensure your iPhone or iPad data is fully protected, here's a look at what each option backs up and when to use it.
When it comes down to it, spam and phishing scams rely primarily on exploiting trust. If the attacker can find a way to make the message appear to be from a known source, the odds that a user will take the bait are much higher. This has led to malware infections that access your contacts and send out infected emails on your behalf to everyone you know, and those same basic techniques have been adapted for instant messaging, social networks, and even SMS text messaging. According to a new report from Kaspersky Lab, Mobile apps are the new frontier.
Microsoft has adopted a new strategy for its Office productivity tools. Rather than holding Office hostage on Windows devices in an effort to attract customers, it will try and make the suite the default productivity choice no matter what platform or device people are using--including Chrome OS and Chromebooks.
The Internet has been abuzz for the last week or so in response to the Heartbleed vulnerability in OpenSSL. While almost all of the attention has centered on patching Web servers and advising users to change their passwords, security researchers have discovered that individual client PCs and devices are also at risk thanks to "Reverse Heartbleed."
By now you've likely heard about the Heartbleed bug, a critical vulnerability that exposes potentially millions of passwords to attack and undermines the very security of the Internet. Because the flaw exists in OpenSSL--which is an open source implementation of SSL encryption--many will question whether the nature of open source development is in some way at fault. I touched based with security experts to get their thoughts.
Once Office for iPad was announced, I couldn't wait to stage a bare-knuckled battle with iWork, the productivity suite that's held down the fort on iPad for four years. I pitted Apple's Pages, Numbers, and Keynote against Microsoft's Word, Excel, and PowerPoint apps, respectively, to determine which better provided all the tools one would need in at typical work environment.
Microsoft's announcement that it's bringing Office to the iPad is a game changer. Naysayers have belittled the tablet as a toy or a content consumption gadget since it launched. The argument has always been shaky, but with the world's most popular productivity suite now available for the iPad, you can no longer deny that the tablet is, in fact, just an evolution of the personal computer.
Malware has been around for more than 40 years, but according to a report from Panda Security 20 percent of all of the malware that's ever existed was created in 2013. That's the equivalent of 30 million new malware threats in one year, or about 82,000 per day.
Frankenmeat may not be the only spam in your refrigerator. A month or so ago, a smart refrigerator was identified as a source of malicious emails. That's just one example of the future we face as we connect millions of insecure devices to the Internet.