Category Archives: Computing

Throwback Thursday: What are the odds?

Internet filter is installed at this site, and in the beginning, there are complaints from users who can’t get to their favorite non-business sites, says an IT pilot fish working there. But after six months and lots of explanations to users, the complaints have stopped. “Then one Saturday evening, a user called me,” fish says. […]

Read More..

Office 365: Enterprise usage doesn't translate into enterprise value

Post Image

Although enterprise subscribers to Office 365 typically use a large number of the in-the-cloud-and-on-premises suite’s components, only two – email and the Office applications – provide significant value, a recently-released survey showed. The disconnect between usage and value was portrayed by research firm Gartner, which in mid-2017 polled more than 160 IT professionals to collect […]

Read More..

Business needs to reduce cyber threat to payment card data

Post Image

In the retail sector, almost all of the data breaches involve some kind of compromise to cardholder data, which is a trend that is expected to increase. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree that your personal […]

Read More..

IT buyer’s guide to business laptops

With hundreds of business-oriented laptops to choose from — everything from sleek ultralight tablets to huge portable workstations — picking the right ones to outfit your company’s workforce can make finding a needle in a haystack seem easy. We’re here to help with a buyer’s guide that breaks the options into categories and provides pros […]

Read More..

Vulnerability exploit report shows importance of patching

Post Image

A remote code execution vulnerability in the Windows common controls remains one of the most popular to exploit – five years after it was patched, data shows. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree that your personal […]

Read More..

Google to open five more datacentre regions across the globe in 2018

Post Image

The Google Cloud Platform is expanding to include five additional datacentre regions and three subsea cables, as the search giant’s pledge to invest $30bn in building out its cloud infrastructure gathers pace. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You […]

Read More..

CES 2018: Apple’s CarPlay wins friends and frenemies

Apple may (or may not) have scaled-back its ambition to build its own connected vehicles, but at CES 2018 we still saw lots of news around its CarPlay system. Here’s a brief run-down on what happened: What they’re saying CES 2018 saw lots of conversation on the topic of connected cars, but the big truth […]

Read More..

Kaspersky uncovers what it claims is the world's most powerful Android spyware

Researchers at Kaspersky have unearthed what they say is the world’s most powerful Android spyware tools – and it’s making waves in Italy where some believe it was authored.  According to Kaspersky, the spyware tool enables attackers to crack Android devices and exfiltrate WhatApp messages. The tool dates back to 2014. It’s able to take […]

Read More..

Mobile devices are even more vulnerable to Meltdown and Spectre than PCs

Post Image

OS fragmentation means that many devices won’t be patched As many as a quarter of business mobile devices are not only vulnerable to malicious attacks, but cannot be patched to fix the flaws. Infosec firm Bridgeway has found that only four per cent of enterprise… Source link

Read More..

London cyber security careers fair highlights opportunities

Post Image

Cyber security is a viable and interesting option for anyone interested in the field, as either a starter career or a mid-career alternative. The cyber security industry’s top employers will be represented at a day-long cyber careers fair aimed at students, professionals and anyone else considering a career in cyber security. By submitting your personal […]

Read More..