BYOD

A new feature in iOS 11.4.1, which Apple released earlier this week, is designed to protect against unwanted intrusions through the iPhone's Lightning Port. However, the protection may be weak at best. The feature, called "USB Restricted Mode," disables data transfer through the Lightning Port after...

SugarCRM has announced the latest version of its app for iOS and Android, Sugar Mobile 5.0. It includes a redesigned user experience based on customer feedback; support for Apple's Touch ID; a new Sugar MACS service that lets users customize login, splash and loading screens to support their organiz...

SPOTLIGHT ON SECURITY

Study: Third-Party Apps Pose Risks for Enterprises

Since mobile computing put an end to the good old days when IT departments had absolute control over software deployed in the enterprise, there's been a rise in employees' use of third-party applications -- a rise that poses security risks to corporate environments. That is one of the findings in a ...

IDC last week reported worldwide PC shipments totaled nearly 72 million units in the fourth quarter of 2015, down 10.6 percent year over year -- the largest YoY decline ever. While shipments in Q4 were slightly higher than in Q3, 2015 was the first year since 2008 that fewer than 300 million PCs wer...

Cisco on Wednesday unveiled Cloud Consumption as a Service, an offering designed to help enterprises discover and continually monitor public cloud use -- aka "shadow IT" -- across their systems. Shadow IT systems in an enterprise or organization expose it to security risks and hidden costs, and may ...

Portfolios of task-oriented mobile apps for employees, contractors and business partners have been transforming the way enterprises conduct business, Apperian reported last week. Companies that have launched mobility initiatives have customized and deployed one or more apps that have streamlined bus...

GOVERNMENT IT REPORT

Surveys Reveal Lax Mobile Security Among Federal Workers

The use of mobile devices provides significant benefits in convenience and workplace productivity. However, two recent reports indicate that, in the enthusiasm for using mobile technologies, U.S. government workers too often ignore security protocols associated with mobile IT. The Office of Personne...

SPOTLIGHT ON SECURITY

Shadow IT Feeds ‘Man in the Cloud’ Attacks

Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization fe...

SPOTLIGHT ON SECURITY

Venom Less Toxic Than Heartbleed

It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows...

BlackBerry on Tuesday introduced its new Leap smartphone for 4G LTE networks at the Mobile World Congress in Barcelona, Spain. Equipped with a touchscreen rather than a physical keyboard, the Leap is a successor to BlackBerry's Z3 model. Its enhanced security and performance features are designed to...

There were 9 billion Internet of Things (IoT) units installed at the end of 2013 by IDC's count, and its analysts expect the figure to hit 28 billion by 2020. That's going to make life difficult for IT security administrators. A Tripwire survey found that employed consumers who took work home had an...

IBM's z13 mainframe launch last week brought back a lot of memories, because I was at IBM when the era of the mainframe collapsed. I also happened to be covering Apple when the era of the Mac collapsed, and I have watched both companies recover -- largely by rediscovering what made them great in the...

Blackphone on Tuesday announced plans to open an app store for privacy-focused applications to run on its secure smartphone. The store is expected to launch in January. The Blackphone runs PrivatOS, a modified version of Android 4.4.2 that comes bundled with tools that encrypt phone calls, texts, e...

A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. "Given this is...

E-Commerce Times Channels