IDC last week reported worldwide PC shipments totaled nearly 72 million units in the fourth quarter of 2015, down 10.6 percent year over year -- the largest YoY decline ever. While shipments in Q4 were slightly higher than in Q3, 2015 was the first year since 2008 that fewer than 300 million PCs wer...

Cisco on Wednesday unveiled Cloud Consumption as a Service, an offering designed to help enterprises discover and continually monitor public cloud use -- aka "shadow IT" -- across their systems. Shadow IT systems in an enterprise or organization expose it to security risks and hidden costs, and may ...

Portfolios of task-oriented mobile apps for employees, contractors and business partners have been transforming the way enterprises conduct business, Apperian reported last week. Companies that have launched mobility initiatives have customized and deployed one or more apps that have streamlined bus...

GOVERNMENT IT REPORT

Surveys Reveal Lax Mobile Security Among Federal Workers

The use of mobile devices provides significant benefits in convenience and workplace productivity. However, two recent reports indicate that, in the enthusiasm for using mobile technologies, U.S. government workers too often ignore security protocols associated with mobile IT. The Office of Personne...

SPOTLIGHT ON SECURITY

Shadow IT Feeds ‘Man in the Cloud’ Attacks

Shadow IT -- the use of unauthorized online services by company employees -- is a concern of cyberwarriors charged with defending business systems against network attacks. There's new evidence that those concerns are justified. A new attack vector on business systems leverages the synchronization fe...

SPOTLIGHT ON SECURITY

Venom Less Toxic Than Heartbleed

It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows...

BlackBerry on Tuesday introduced its new Leap smartphone for 4G LTE networks at the Mobile World Congress in Barcelona, Spain. Equipped with a touchscreen rather than a physical keyboard, the Leap is a successor to BlackBerry's Z3 model. Its enhanced security and performance features are designed to...

There were 9 billion Internet of Things (IoT) units installed at the end of 2013 by IDC's count, and its analysts expect the figure to hit 28 billion by 2020. That's going to make life difficult for IT security administrators. A Tripwire survey found that employed consumers who took work home had an...

IBM's z13 mainframe launch last week brought back a lot of memories, because I was at IBM when the era of the mainframe collapsed. I also happened to be covering Apple when the era of the Mac collapsed, and I have watched both companies recover -- largely by rediscovering what made them great in the...

Blackphone on Tuesday announced plans to open an app store for privacy-focused applications to run on its secure smartphone. The store is expected to launch in January. The Blackphone runs PrivatOS, a modified version of Android 4.4.2 that comes bundled with tools that encrypt phone calls, texts, e...

A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. "Given this is...

Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except t...

E-commerce Times Channels